Dec 13 14:05:21.988992 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 14:05:21.989013 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:05:21.989021 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Dec 13 14:05:21.989028 kernel: printk: bootconsole [pl11] enabled Dec 13 14:05:21.989033 kernel: efi: EFI v2.70 by EDK II Dec 13 14:05:21.989038 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 Dec 13 14:05:21.989045 kernel: random: crng init done Dec 13 14:05:21.989050 kernel: ACPI: Early table checksum verification disabled Dec 13 14:05:21.989056 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Dec 13 14:05:21.989061 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989067 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989072 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Dec 13 14:05:21.989079 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989085 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989091 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989097 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989103 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989110 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989116 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Dec 13 14:05:21.989122 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:21.989128 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Dec 13 14:05:21.989133 kernel: NUMA: Failed to initialise from firmware Dec 13 14:05:21.989140 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:05:21.989145 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Dec 13 14:05:21.989151 kernel: Zone ranges: Dec 13 14:05:21.989157 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Dec 13 14:05:21.989163 kernel: DMA32 empty Dec 13 14:05:21.989168 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:05:21.989175 kernel: Movable zone start for each node Dec 13 14:05:21.989181 kernel: Early memory node ranges Dec 13 14:05:21.989187 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Dec 13 14:05:21.989192 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Dec 13 14:05:21.989198 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Dec 13 14:05:21.989204 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Dec 13 14:05:21.989210 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Dec 13 14:05:21.989215 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Dec 13 14:05:21.989221 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:05:21.989227 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:05:21.989232 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Dec 13 14:05:21.989238 kernel: psci: probing for conduit method from ACPI. Dec 13 14:05:21.989248 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 14:05:21.989254 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:05:21.989260 kernel: psci: MIGRATE_INFO_TYPE not supported. Dec 13 14:05:21.989266 kernel: psci: SMC Calling Convention v1.4 Dec 13 14:05:21.989272 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Dec 13 14:05:21.989279 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Dec 13 14:05:21.989286 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:05:21.989292 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:05:21.989298 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:05:21.989304 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:05:21.989310 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:05:21.989316 kernel: CPU features: detected: Hardware dirty bit management Dec 13 14:05:21.989322 kernel: CPU features: detected: Spectre-BHB Dec 13 14:05:21.989329 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:05:21.989335 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:05:21.989341 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 14:05:21.989348 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Dec 13 14:05:21.989354 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 14:05:21.989360 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Dec 13 14:05:21.989366 kernel: Policy zone: Normal Dec 13 14:05:21.989374 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:05:21.989381 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:05:21.989387 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:05:21.989393 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:05:21.989399 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:05:21.989406 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Dec 13 14:05:21.989412 kernel: Memory: 3986940K/4194160K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 207220K reserved, 0K cma-reserved) Dec 13 14:05:21.989420 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:05:21.989426 kernel: trace event string verifier disabled Dec 13 14:05:21.989432 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:05:21.989439 kernel: rcu: RCU event tracing is enabled. Dec 13 14:05:21.989445 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:05:21.989451 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:05:21.989458 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:05:21.989464 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:05:21.989470 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:05:21.989476 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:05:21.989482 kernel: GICv3: 960 SPIs implemented Dec 13 14:05:21.989490 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:05:21.989496 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:05:21.989502 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:05:21.989508 kernel: GICv3: 16 PPIs implemented Dec 13 14:05:21.989514 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Dec 13 14:05:21.989520 kernel: ITS: No ITS available, not enabling LPIs Dec 13 14:05:21.989527 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:05:21.989533 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 14:05:21.989539 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 14:05:21.989546 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 14:05:21.989552 kernel: Console: colour dummy device 80x25 Dec 13 14:05:21.989560 kernel: printk: console [tty1] enabled Dec 13 14:05:21.989567 kernel: ACPI: Core revision 20210730 Dec 13 14:05:21.989574 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 14:05:21.989580 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:05:21.989586 kernel: LSM: Security Framework initializing Dec 13 14:05:21.989593 kernel: SELinux: Initializing. Dec 13 14:05:21.989600 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:05:21.989606 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:05:21.989612 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Dec 13 14:05:21.989620 kernel: Hyper-V: Host Build 10.0.22477.1594-1-0 Dec 13 14:05:21.989626 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:05:21.989633 kernel: Remapping and enabling EFI services. Dec 13 14:05:21.989639 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:05:21.989645 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:05:21.989652 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Dec 13 14:05:21.989658 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:05:21.989664 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 14:05:21.989671 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:05:21.989677 kernel: SMP: Total of 2 processors activated. Dec 13 14:05:21.989685 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:05:21.989692 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Dec 13 14:05:21.989698 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 14:05:21.989705 kernel: CPU features: detected: CRC32 instructions Dec 13 14:05:21.989711 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 14:05:21.989717 kernel: CPU features: detected: LSE atomic instructions Dec 13 14:05:21.989724 kernel: CPU features: detected: Privileged Access Never Dec 13 14:05:21.989730 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:05:21.989736 kernel: alternatives: patching kernel code Dec 13 14:05:21.989744 kernel: devtmpfs: initialized Dec 13 14:05:21.989755 kernel: KASLR enabled Dec 13 14:05:21.989762 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:05:21.989786 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:05:21.989795 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:05:21.989801 kernel: SMBIOS 3.1.0 present. Dec 13 14:05:21.989808 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Dec 13 14:05:21.989815 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:05:21.989822 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:05:21.989830 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:05:21.989837 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:05:21.989844 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:05:21.989851 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Dec 13 14:05:21.989858 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:05:21.989864 kernel: cpuidle: using governor menu Dec 13 14:05:21.989871 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:05:21.989879 kernel: ASID allocator initialised with 32768 entries Dec 13 14:05:21.989886 kernel: ACPI: bus type PCI registered Dec 13 14:05:21.989892 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:05:21.989899 kernel: Serial: AMBA PL011 UART driver Dec 13 14:05:21.989906 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:05:21.989912 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:05:21.989919 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:05:21.989926 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:05:21.989932 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:05:21.989940 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:05:21.989947 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:05:21.989954 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:05:21.989960 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:05:21.989967 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:05:21.989973 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:05:21.989980 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:05:21.989987 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:05:21.989993 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:05:21.990001 kernel: ACPI: Interpreter enabled Dec 13 14:05:21.990007 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:05:21.990014 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Dec 13 14:05:21.990021 kernel: printk: console [ttyAMA0] enabled Dec 13 14:05:21.990027 kernel: printk: bootconsole [pl11] disabled Dec 13 14:05:21.990034 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Dec 13 14:05:21.990041 kernel: iommu: Default domain type: Translated Dec 13 14:05:21.990047 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:05:21.990054 kernel: vgaarb: loaded Dec 13 14:05:21.990060 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:05:21.990068 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:05:21.990075 kernel: PTP clock support registered Dec 13 14:05:21.990081 kernel: Registered efivars operations Dec 13 14:05:21.990088 kernel: No ACPI PMU IRQ for CPU0 Dec 13 14:05:21.990094 kernel: No ACPI PMU IRQ for CPU1 Dec 13 14:05:21.990101 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:05:21.990107 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:05:21.990114 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:05:21.990122 kernel: pnp: PnP ACPI init Dec 13 14:05:21.990128 kernel: pnp: PnP ACPI: found 0 devices Dec 13 14:05:21.990135 kernel: NET: Registered PF_INET protocol family Dec 13 14:05:21.990142 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:05:21.990148 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:05:21.990155 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:05:21.990162 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:05:21.990169 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:05:21.990175 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:05:21.990183 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:05:21.990190 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:05:21.990197 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:05:21.990203 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:05:21.990210 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Dec 13 14:05:21.990216 kernel: kvm [1]: HYP mode not available Dec 13 14:05:21.990223 kernel: Initialise system trusted keyrings Dec 13 14:05:21.990230 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:05:21.990236 kernel: Key type asymmetric registered Dec 13 14:05:21.990244 kernel: Asymmetric key parser 'x509' registered Dec 13 14:05:21.990251 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:05:21.990257 kernel: io scheduler mq-deadline registered Dec 13 14:05:21.990264 kernel: io scheduler kyber registered Dec 13 14:05:21.990270 kernel: io scheduler bfq registered Dec 13 14:05:21.990277 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:05:21.990284 kernel: thunder_xcv, ver 1.0 Dec 13 14:05:21.990290 kernel: thunder_bgx, ver 1.0 Dec 13 14:05:21.990297 kernel: nicpf, ver 1.0 Dec 13 14:05:21.990303 kernel: nicvf, ver 1.0 Dec 13 14:05:21.990428 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:05:21.990488 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:05:21 UTC (1734098721) Dec 13 14:05:21.990498 kernel: efifb: probing for efifb Dec 13 14:05:21.990505 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:05:21.990511 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:05:21.990518 kernel: efifb: scrolling: redraw Dec 13 14:05:21.990525 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:05:21.990533 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:05:21.990540 kernel: fb0: EFI VGA frame buffer device Dec 13 14:05:21.990547 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Dec 13 14:05:21.990553 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:05:21.990560 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:05:21.990566 kernel: Segment Routing with IPv6 Dec 13 14:05:21.990573 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:05:21.990580 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:05:21.990586 kernel: Key type dns_resolver registered Dec 13 14:05:21.990593 kernel: registered taskstats version 1 Dec 13 14:05:21.990601 kernel: Loading compiled-in X.509 certificates Dec 13 14:05:21.990608 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:05:21.990614 kernel: Key type .fscrypt registered Dec 13 14:05:21.990621 kernel: Key type fscrypt-provisioning registered Dec 13 14:05:21.990628 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:05:21.990634 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:05:21.990641 kernel: ima: No architecture policies found Dec 13 14:05:21.990648 kernel: clk: Disabling unused clocks Dec 13 14:05:21.990656 kernel: Freeing unused kernel memory: 36416K Dec 13 14:05:21.990662 kernel: Run /init as init process Dec 13 14:05:21.990669 kernel: with arguments: Dec 13 14:05:21.990675 kernel: /init Dec 13 14:05:21.990682 kernel: with environment: Dec 13 14:05:21.990688 kernel: HOME=/ Dec 13 14:05:21.990694 kernel: TERM=linux Dec 13 14:05:21.990701 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:05:21.990710 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:05:21.990721 systemd[1]: Detected virtualization microsoft. Dec 13 14:05:21.990728 systemd[1]: Detected architecture arm64. Dec 13 14:05:21.990735 systemd[1]: Running in initrd. Dec 13 14:05:21.990742 systemd[1]: No hostname configured, using default hostname. Dec 13 14:05:21.990749 systemd[1]: Hostname set to . Dec 13 14:05:21.990756 systemd[1]: Initializing machine ID from random generator. Dec 13 14:05:21.990764 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:05:21.990783 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:05:21.990790 systemd[1]: Reached target cryptsetup.target. Dec 13 14:05:21.990797 systemd[1]: Reached target paths.target. Dec 13 14:05:21.990805 systemd[1]: Reached target slices.target. Dec 13 14:05:21.990812 systemd[1]: Reached target swap.target. Dec 13 14:05:21.990819 systemd[1]: Reached target timers.target. Dec 13 14:05:21.990826 systemd[1]: Listening on iscsid.socket. Dec 13 14:05:21.990833 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:05:21.990842 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:05:21.990849 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:05:21.990856 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:05:21.990863 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:05:21.990871 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:05:21.990878 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:05:21.990885 systemd[1]: Reached target sockets.target. Dec 13 14:05:21.990892 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:05:21.990899 systemd[1]: Finished network-cleanup.service. Dec 13 14:05:21.990908 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:05:21.990915 systemd[1]: Starting systemd-journald.service... Dec 13 14:05:21.990922 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:05:21.990929 systemd[1]: Starting systemd-resolved.service... Dec 13 14:05:21.990937 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:05:21.990948 systemd-journald[276]: Journal started Dec 13 14:05:21.990986 systemd-journald[276]: Runtime Journal (/run/log/journal/f79e5eb0227f45fb8e57b34cbd979040) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:05:21.969654 systemd-modules-load[277]: Inserted module 'overlay' Dec 13 14:05:22.010862 systemd[1]: Started systemd-journald.service. Dec 13 14:05:22.010883 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:05:22.007702 systemd-resolved[278]: Positive Trust Anchors: Dec 13 14:05:22.041310 kernel: Bridge firewalling registered Dec 13 14:05:22.041331 kernel: audit: type=1130 audit(1734098722.026:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.007710 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:05:22.076587 kernel: SCSI subsystem initialized Dec 13 14:05:22.076621 kernel: audit: type=1130 audit(1734098722.053:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.007738 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:05:22.143957 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:05:22.143992 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:05:22.144002 kernel: audit: type=1130 audit(1734098722.113:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.144013 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:05:22.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.009878 systemd-resolved[278]: Defaulting to hostname 'linux'. Dec 13 14:05:22.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.027188 systemd-modules-load[277]: Inserted module 'br_netfilter' Dec 13 14:05:22.189431 kernel: audit: type=1130 audit(1734098722.143:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.189459 kernel: audit: type=1130 audit(1734098722.168:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.041018 systemd[1]: Started systemd-resolved.service. Dec 13 14:05:22.053618 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:05:22.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.113977 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:05:22.235330 kernel: audit: type=1130 audit(1734098722.193:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.144152 systemd-modules-load[277]: Inserted module 'dm_multipath' Dec 13 14:05:22.144734 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:05:22.168944 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:05:22.193928 systemd[1]: Reached target nss-lookup.target. Dec 13 14:05:22.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.219584 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:05:22.224975 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:05:22.234102 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:05:22.332819 kernel: audit: type=1130 audit(1734098722.260:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.332844 kernel: audit: type=1130 audit(1734098722.287:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.332856 kernel: audit: type=1130 audit(1734098722.306:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.253387 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:05:22.340911 dracut-cmdline[299]: dracut-dracut-053 Dec 13 14:05:22.280092 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:05:22.288149 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:05:22.310503 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:05:22.358666 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:05:22.435809 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:05:22.450802 kernel: iscsi: registered transport (tcp) Dec 13 14:05:22.470697 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:05:22.470715 kernel: QLogic iSCSI HBA Driver Dec 13 14:05:22.499628 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:05:22.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.504687 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:05:22.557806 kernel: raid6: neonx8 gen() 13826 MB/s Dec 13 14:05:22.577795 kernel: raid6: neonx8 xor() 10848 MB/s Dec 13 14:05:22.597806 kernel: raid6: neonx4 gen() 13530 MB/s Dec 13 14:05:22.618813 kernel: raid6: neonx4 xor() 11066 MB/s Dec 13 14:05:22.638796 kernel: raid6: neonx2 gen() 12962 MB/s Dec 13 14:05:22.658789 kernel: raid6: neonx2 xor() 10292 MB/s Dec 13 14:05:22.679781 kernel: raid6: neonx1 gen() 10568 MB/s Dec 13 14:05:22.700784 kernel: raid6: neonx1 xor() 8791 MB/s Dec 13 14:05:22.720780 kernel: raid6: int64x8 gen() 6279 MB/s Dec 13 14:05:22.742781 kernel: raid6: int64x8 xor() 3536 MB/s Dec 13 14:05:22.762779 kernel: raid6: int64x4 gen() 7149 MB/s Dec 13 14:05:22.782780 kernel: raid6: int64x4 xor() 3856 MB/s Dec 13 14:05:22.804781 kernel: raid6: int64x2 gen() 6139 MB/s Dec 13 14:05:22.825819 kernel: raid6: int64x2 xor() 3319 MB/s Dec 13 14:05:22.845780 kernel: raid6: int64x1 gen() 5036 MB/s Dec 13 14:05:22.870451 kernel: raid6: int64x1 xor() 2646 MB/s Dec 13 14:05:22.870462 kernel: raid6: using algorithm neonx8 gen() 13826 MB/s Dec 13 14:05:22.870470 kernel: raid6: .... xor() 10848 MB/s, rmw enabled Dec 13 14:05:22.874407 kernel: raid6: using neon recovery algorithm Dec 13 14:05:22.890784 kernel: xor: measuring software checksum speed Dec 13 14:05:22.898152 kernel: 8regs : 16375 MB/sec Dec 13 14:05:22.898172 kernel: 32regs : 20665 MB/sec Dec 13 14:05:22.901886 kernel: arm64_neon : 27719 MB/sec Dec 13 14:05:22.901896 kernel: xor: using function: arm64_neon (27719 MB/sec) Dec 13 14:05:22.962789 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:05:22.973419 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:05:22.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.980000 audit: BPF prog-id=7 op=LOAD Dec 13 14:05:22.980000 audit: BPF prog-id=8 op=LOAD Dec 13 14:05:22.981938 systemd[1]: Starting systemd-udevd.service... Dec 13 14:05:22.995884 systemd-udevd[476]: Using default interface naming scheme 'v252'. Dec 13 14:05:23.001416 systemd[1]: Started systemd-udevd.service. Dec 13 14:05:23.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.013113 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:05:23.029886 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Dec 13 14:05:23.062683 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:05:23.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.067988 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:05:23.109451 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:05:23.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.163980 kernel: hv_vmbus: Vmbus version:5.3 Dec 13 14:05:23.178795 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:05:23.178841 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:05:23.185823 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:05:23.200488 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 14:05:23.200541 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:05:23.210346 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 14:05:23.210402 kernel: scsi host1: storvsc_host_t Dec 13 14:05:23.210445 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:05:23.222040 kernel: scsi host0: storvsc_host_t Dec 13 14:05:23.235804 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:05:23.235894 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:05:23.259736 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:05:23.283290 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:05:23.283399 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:05:23.283476 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:05:23.283552 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:05:23.283626 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:23.283636 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:05:23.292552 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:05:23.294224 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:05:23.294237 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:05:23.316798 kernel: hv_netvsc 00224878-0f19-0022-4878-0f1900224878 eth0: VF slot 1 added Dec 13 14:05:23.324800 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:05:23.335409 kernel: hv_pci 80512ba9-2aff-4a01-8f18-30273fcdfec4: PCI VMBus probing: Using version 0x10004 Dec 13 14:05:23.435840 kernel: hv_pci 80512ba9-2aff-4a01-8f18-30273fcdfec4: PCI host bridge to bus 2aff:00 Dec 13 14:05:23.435975 kernel: pci_bus 2aff:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Dec 13 14:05:23.436100 kernel: pci_bus 2aff:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:05:23.436186 kernel: pci 2aff:00:02.0: [15b3:1018] type 00 class 0x020000 Dec 13 14:05:23.436293 kernel: pci 2aff:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:05:23.436386 kernel: pci 2aff:00:02.0: enabling Extended Tags Dec 13 14:05:23.436478 kernel: pci 2aff:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 2aff:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Dec 13 14:05:23.436571 kernel: pci_bus 2aff:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:05:23.436659 kernel: pci 2aff:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:05:23.472798 kernel: mlx5_core 2aff:00:02.0: firmware version: 16.30.1284 Dec 13 14:05:23.689518 kernel: mlx5_core 2aff:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Dec 13 14:05:23.689636 kernel: hv_netvsc 00224878-0f19-0022-4878-0f1900224878 eth0: VF registering: eth1 Dec 13 14:05:23.689718 kernel: mlx5_core 2aff:00:02.0 eth1: joined to eth0 Dec 13 14:05:23.697795 kernel: mlx5_core 2aff:00:02.0 enP11007s1: renamed from eth1 Dec 13 14:05:24.016551 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:05:24.136794 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (543) Dec 13 14:05:24.151792 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:05:24.336353 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:05:24.419614 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:05:24.425559 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:05:24.439477 systemd[1]: Starting disk-uuid.service... Dec 13 14:05:24.462802 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:24.468809 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:25.476811 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:25.477213 disk-uuid[604]: The operation has completed successfully. Dec 13 14:05:25.534234 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:05:25.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:25.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:25.534326 systemd[1]: Finished disk-uuid.service. Dec 13 14:05:25.546784 systemd[1]: Starting verity-setup.service... Dec 13 14:05:25.604041 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:05:25.951143 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:05:25.958000 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:05:25.969755 systemd[1]: Finished verity-setup.service. Dec 13 14:05:25.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.024796 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:05:26.025125 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:05:26.028970 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:05:26.029742 systemd[1]: Starting ignition-setup.service... Dec 13 14:05:26.044543 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:05:26.069282 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:05:26.069341 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:05:26.069357 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:05:26.122164 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:05:26.151854 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 13 14:05:26.151879 kernel: audit: type=1130 audit(1734098726.126:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.135931 systemd[1]: Starting systemd-networkd.service... Dec 13 14:05:26.170663 kernel: audit: type=1334 audit(1734098726.129:22): prog-id=9 op=LOAD Dec 13 14:05:26.129000 audit: BPF prog-id=9 op=LOAD Dec 13 14:05:26.179171 systemd-networkd[842]: lo: Link UP Dec 13 14:05:26.179187 systemd-networkd[842]: lo: Gained carrier Dec 13 14:05:26.179584 systemd-networkd[842]: Enumeration completed Dec 13 14:05:26.212129 kernel: audit: type=1130 audit(1734098726.189:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.180228 systemd-networkd[842]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:05:26.182641 systemd[1]: Started systemd-networkd.service. Dec 13 14:05:26.189953 systemd[1]: Reached target network.target. Dec 13 14:05:26.223186 systemd[1]: Starting iscsiuio.service... Dec 13 14:05:26.235096 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:05:26.235462 systemd[1]: Started iscsiuio.service. Dec 13 14:05:26.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.246586 systemd[1]: Starting iscsid.service... Dec 13 14:05:26.268621 kernel: audit: type=1130 audit(1734098726.243:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.268651 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:05:26.268651 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:05:26.268651 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:05:26.268651 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:05:26.268651 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:05:26.268651 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:05:26.268651 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:05:26.392131 kernel: audit: type=1130 audit(1734098726.271:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.392156 kernel: audit: type=1130 audit(1734098726.333:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.392167 kernel: mlx5_core 2aff:00:02.0 enP11007s1: Link up Dec 13 14:05:26.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.265347 systemd[1]: Started iscsid.service. Dec 13 14:05:26.278900 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:05:26.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.306088 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:05:26.443002 kernel: audit: type=1130 audit(1734098726.404:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.443027 kernel: hv_netvsc 00224878-0f19-0022-4878-0f1900224878 eth0: Data path switched to VF: enP11007s1 Dec 13 14:05:26.443166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:05:26.334203 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:05:26.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.357122 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:05:26.470098 kernel: audit: type=1130 audit(1734098726.446:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:26.377911 systemd[1]: Reached target remote-fs.target. Dec 13 14:05:26.383407 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:05:26.397732 systemd[1]: Finished ignition-setup.service. Dec 13 14:05:26.405760 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:05:26.425102 systemd-networkd[842]: enP11007s1: Link UP Dec 13 14:05:26.425174 systemd-networkd[842]: eth0: Link UP Dec 13 14:05:26.425283 systemd-networkd[842]: eth0: Gained carrier Dec 13 14:05:26.434971 systemd-networkd[842]: enP11007s1: Gained carrier Dec 13 14:05:26.439386 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:05:26.474863 systemd-networkd[842]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:05:27.867919 systemd-networkd[842]: eth0: Gained IPv6LL Dec 13 14:05:31.773836 ignition[869]: Ignition 2.14.0 Dec 13 14:05:31.776954 ignition[869]: Stage: fetch-offline Dec 13 14:05:31.777046 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:31.777076 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:31.897432 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:31.897599 ignition[869]: parsed url from cmdline: "" Dec 13 14:05:31.897603 ignition[869]: no config URL provided Dec 13 14:05:31.897608 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:05:31.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:31.909914 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:05:31.943987 kernel: audit: type=1130 audit(1734098731.917:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:31.897615 ignition[869]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:05:31.938439 systemd[1]: Starting ignition-fetch.service... Dec 13 14:05:31.897621 ignition[869]: failed to fetch config: resource requires networking Dec 13 14:05:31.897726 ignition[869]: Ignition finished successfully Dec 13 14:05:31.948626 ignition[875]: Ignition 2.14.0 Dec 13 14:05:31.948632 ignition[875]: Stage: fetch Dec 13 14:05:31.948731 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:31.948748 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:31.951262 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:31.951365 ignition[875]: parsed url from cmdline: "" Dec 13 14:05:31.951368 ignition[875]: no config URL provided Dec 13 14:05:31.951373 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:05:31.951380 ignition[875]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:05:31.951404 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:05:32.070477 ignition[875]: GET result: OK Dec 13 14:05:32.070582 ignition[875]: config has been read from IMDS userdata Dec 13 14:05:32.070626 ignition[875]: parsing config with SHA512: e99e27de321dfa981fe1c4aa73b69d3c5c3ddf5c5da5fdeb69fce38e6bf52f2e08acd8367f1fff5ac109ec172ca14ad065c1401a465b06eb840aeae4c0dc1186 Dec 13 14:05:32.074008 unknown[875]: fetched base config from "system" Dec 13 14:05:32.074576 ignition[875]: fetch: fetch complete Dec 13 14:05:32.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.074016 unknown[875]: fetched base config from "system" Dec 13 14:05:32.111674 kernel: audit: type=1130 audit(1734098732.086:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.074582 ignition[875]: fetch: fetch passed Dec 13 14:05:32.074021 unknown[875]: fetched user config from "azure" Dec 13 14:05:32.074632 ignition[875]: Ignition finished successfully Dec 13 14:05:32.079148 systemd[1]: Finished ignition-fetch.service. Dec 13 14:05:32.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.114215 ignition[882]: Ignition 2.14.0 Dec 13 14:05:32.087973 systemd[1]: Starting ignition-kargs.service... Dec 13 14:05:32.158580 kernel: audit: type=1130 audit(1734098732.126:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.114221 ignition[882]: Stage: kargs Dec 13 14:05:32.122729 systemd[1]: Finished ignition-kargs.service. Dec 13 14:05:32.114363 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:32.192960 kernel: audit: type=1130 audit(1734098732.169:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.147857 systemd[1]: Starting ignition-disks.service... Dec 13 14:05:32.114388 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:32.165367 systemd[1]: Finished ignition-disks.service. Dec 13 14:05:32.117295 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:32.169661 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:05:32.120052 ignition[882]: kargs: kargs passed Dec 13 14:05:32.193109 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:05:32.120100 ignition[882]: Ignition finished successfully Dec 13 14:05:32.201005 systemd[1]: Reached target local-fs.target. Dec 13 14:05:32.154136 ignition[888]: Ignition 2.14.0 Dec 13 14:05:32.208795 systemd[1]: Reached target sysinit.target. Dec 13 14:05:32.154142 ignition[888]: Stage: disks Dec 13 14:05:32.217976 systemd[1]: Reached target basic.target. Dec 13 14:05:32.154232 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:32.226598 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:05:32.154250 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:32.276841 systemd-fsck[896]: ROOT: clean, 621/7326000 files, 481076/7359488 blocks Dec 13 14:05:32.156734 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:32.280195 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:05:32.321397 kernel: audit: type=1130 audit(1734098732.297:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:32.163286 ignition[888]: disks: disks passed Dec 13 14:05:32.299706 systemd[1]: Mounting sysroot.mount... Dec 13 14:05:32.163329 ignition[888]: Ignition finished successfully Dec 13 14:05:32.340801 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:05:32.341547 systemd[1]: Mounted sysroot.mount. Dec 13 14:05:32.345421 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:05:32.402911 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:05:32.407819 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:05:32.419315 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:05:32.419361 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:05:32.435123 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:05:32.531253 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:05:32.535922 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:05:32.557858 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Dec 13 14:05:32.569035 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:05:32.569055 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:05:32.573569 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:05:32.577060 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:05:32.586609 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:05:32.613021 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:05:32.646997 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:05:32.656021 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:05:33.533183 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:05:33.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:33.538657 systemd[1]: Starting ignition-mount.service... Dec 13 14:05:33.566510 kernel: audit: type=1130 audit(1734098733.537:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:33.561678 systemd[1]: Starting sysroot-boot.service... Dec 13 14:05:33.574544 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:05:33.574692 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:05:33.592780 systemd[1]: Finished sysroot-boot.service. Dec 13 14:05:33.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:33.618844 kernel: audit: type=1130 audit(1734098733.596:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:33.653236 ignition[975]: INFO : Ignition 2.14.0 Dec 13 14:05:33.653236 ignition[975]: INFO : Stage: mount Dec 13 14:05:33.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:33.681638 ignition[975]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:33.681638 ignition[975]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:33.681638 ignition[975]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:33.681638 ignition[975]: INFO : mount: mount passed Dec 13 14:05:33.681638 ignition[975]: INFO : Ignition finished successfully Dec 13 14:05:33.723962 kernel: audit: type=1130 audit(1734098733.663:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:33.659970 systemd[1]: Finished ignition-mount.service. Dec 13 14:05:35.269955 coreos-metadata[906]: Dec 13 14:05:35.269 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:05:35.279432 coreos-metadata[906]: Dec 13 14:05:35.279 INFO Fetch successful Dec 13 14:05:35.317319 coreos-metadata[906]: Dec 13 14:05:35.317 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:05:35.330861 coreos-metadata[906]: Dec 13 14:05:35.330 INFO Fetch successful Dec 13 14:05:35.357005 coreos-metadata[906]: Dec 13 14:05:35.356 INFO wrote hostname ci-3510.3.6-a-52bcbbb462 to /sysroot/etc/hostname Dec 13 14:05:35.365029 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:05:35.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:35.371254 systemd[1]: Starting ignition-files.service... Dec 13 14:05:35.396503 kernel: audit: type=1130 audit(1734098735.369:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:35.395678 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:05:35.415410 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Dec 13 14:05:35.428223 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:05:35.428246 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:05:35.428256 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:05:35.437962 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:05:35.455303 ignition[1004]: INFO : Ignition 2.14.0 Dec 13 14:05:35.459247 ignition[1004]: INFO : Stage: files Dec 13 14:05:35.459247 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:35.459247 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:35.481726 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:35.481726 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:05:35.481726 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:05:35.481726 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:05:35.638044 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:05:35.645134 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:05:35.645134 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:05:35.645129 unknown[1004]: wrote ssh authorized keys file for user: core Dec 13 14:05:35.669197 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:05:35.679149 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:05:35.876073 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:05:35.938436 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:05:35.949932 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:05:35.949932 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:05:35.949932 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:05:35.949932 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:05:35.949932 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:05:36.011559 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1009) Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486768196" Dec 13 14:05:36.011580 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486768196": device or resource busy Dec 13 14:05:36.011580 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2486768196", trying btrfs: device or resource busy Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486768196" Dec 13 14:05:36.011580 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486768196" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2486768196" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2486768196" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1695289197" Dec 13 14:05:36.165098 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1695289197": device or resource busy Dec 13 14:05:36.165098 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1695289197", trying btrfs: device or resource busy Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1695289197" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1695289197" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1695289197" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1695289197" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:05:36.165098 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:05:36.012451 systemd[1]: mnt-oem2486768196.mount: Deactivated successfully. Dec 13 14:05:36.318374 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 14:05:36.035255 systemd[1]: mnt-oem1695289197.mount: Deactivated successfully. Dec 13 14:05:36.504878 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Dec 13 14:05:36.719371 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:05:36.719371 ignition[1004]: INFO : files: op(13): [started] processing unit "waagent.service" Dec 13 14:05:36.719371 ignition[1004]: INFO : files: op(13): [finished] processing unit "waagent.service" Dec 13 14:05:36.719371 ignition[1004]: INFO : files: op(14): [started] processing unit "nvidia.service" Dec 13 14:05:36.719371 ignition[1004]: INFO : files: op(14): [finished] processing unit "nvidia.service" Dec 13 14:05:36.719371 ignition[1004]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Dec 13 14:05:36.798398 kernel: audit: type=1130 audit(1734098736.742:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:05:36.798488 ignition[1004]: INFO : files: files passed Dec 13 14:05:36.798488 ignition[1004]: INFO : Ignition finished successfully Dec 13 14:05:36.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.733105 systemd[1]: Finished ignition-files.service. Dec 13 14:05:36.975932 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 14:05:36.975959 kernel: audit: type=1130 audit(1734098736.947:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.766285 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:05:36.981156 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:05:36.771938 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:05:36.778110 systemd[1]: Starting ignition-quench.service... Dec 13 14:05:36.790985 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:05:36.791297 systemd[1]: Finished ignition-quench.service. Dec 13 14:05:37.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.803076 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:05:36.819100 systemd[1]: Reached target ignition-complete.target. Dec 13 14:05:37.059216 kernel: audit: type=1131 audit(1734098737.025:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:36.835443 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:05:36.856083 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:05:36.856191 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:05:36.867765 systemd[1]: Reached target initrd-fs.target. Dec 13 14:05:36.879363 systemd[1]: Reached target initrd.target. Dec 13 14:05:36.890302 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:05:36.891168 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:05:36.943824 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:05:36.949133 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:05:36.983705 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:05:36.993960 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:05:37.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.008667 systemd[1]: Stopped target timers.target. Dec 13 14:05:37.016713 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:05:37.182085 kernel: audit: type=1131 audit(1734098737.147:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.016840 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:05:37.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.046183 systemd[1]: Stopped target initrd.target. Dec 13 14:05:37.209955 kernel: audit: type=1131 audit(1734098737.186:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.054947 systemd[1]: Stopped target basic.target. Dec 13 14:05:37.255851 kernel: audit: type=1131 audit(1734098737.215:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.255878 kernel: audit: type=1131 audit(1734098737.238:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.063157 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:05:37.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.071966 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:05:37.291831 kernel: audit: type=1131 audit(1734098737.260:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.291857 ignition[1042]: INFO : Ignition 2.14.0 Dec 13 14:05:37.291857 ignition[1042]: INFO : Stage: umount Dec 13 14:05:37.291857 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:37.291857 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:37.291857 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:37.291857 ignition[1042]: INFO : umount: umount passed Dec 13 14:05:37.291857 ignition[1042]: INFO : Ignition finished successfully Dec 13 14:05:37.382294 kernel: audit: type=1131 audit(1734098737.317:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.382318 kernel: audit: type=1131 audit(1734098737.357:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.081314 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:05:37.407980 kernel: audit: type=1131 audit(1734098737.386:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.089793 systemd[1]: Stopped target remote-fs.target. Dec 13 14:05:37.097569 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:05:37.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.105435 systemd[1]: Stopped target sysinit.target. Dec 13 14:05:37.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.115853 systemd[1]: Stopped target local-fs.target. Dec 13 14:05:37.124011 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:05:37.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.132034 systemd[1]: Stopped target swap.target. Dec 13 14:05:37.139749 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:05:37.139869 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:05:37.168456 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:05:37.176596 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:05:37.176697 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:05:37.206472 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:05:37.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.206594 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:05:37.215404 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:05:37.215492 systemd[1]: Stopped ignition-files.service. Dec 13 14:05:37.238616 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:05:37.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.238716 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:05:37.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.261640 systemd[1]: Stopping ignition-mount.service... Dec 13 14:05:37.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.557000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:05:37.292459 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:05:37.302220 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:05:37.302400 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:05:37.346805 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:05:37.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.346990 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:05:37.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.379851 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:05:37.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.379950 systemd[1]: Stopped ignition-mount.service. Dec 13 14:05:37.388797 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:05:37.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.388855 systemd[1]: Stopped ignition-disks.service. Dec 13 14:05:37.412100 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:05:37.412155 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:05:37.420837 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:05:37.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.420874 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:05:37.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.429139 systemd[1]: Stopped target network.target. Dec 13 14:05:37.685317 kernel: hv_netvsc 00224878-0f19-0022-4878-0f1900224878 eth0: Data path switched from VF: enP11007s1 Dec 13 14:05:37.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.438712 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:05:37.438787 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:05:37.446854 systemd[1]: Stopped target paths.target. Dec 13 14:05:37.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.455303 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:05:37.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.458809 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:05:37.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.463934 systemd[1]: Stopped target slices.target. Dec 13 14:05:37.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.472954 systemd[1]: Stopped target sockets.target. Dec 13 14:05:37.480661 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:05:37.480694 systemd[1]: Closed iscsid.socket. Dec 13 14:05:37.488515 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:05:37.488536 systemd[1]: Closed iscsiuio.socket. Dec 13 14:05:37.496888 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:05:37.496931 systemd[1]: Stopped ignition-setup.service. Dec 13 14:05:37.504895 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:05:37.514985 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:05:37.522953 systemd-networkd[842]: eth0: DHCPv6 lease lost Dec 13 14:05:37.775000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:05:37.524383 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:05:37.524497 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:05:37.538012 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:05:37.538093 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:05:37.548112 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:05:37.548201 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:05:37.557954 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:05:37.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:37.557995 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:05:37.571321 systemd[1]: Stopping network-cleanup.service... Dec 13 14:05:37.581024 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:05:37.581094 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:05:37.589852 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:05:37.589908 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:05:37.602452 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:05:37.602517 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:05:37.608968 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:05:37.619578 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:05:37.620090 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:05:37.620211 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:05:37.630692 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:05:37.630742 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:05:37.639384 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:05:37.639419 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:05:37.648626 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:05:37.648670 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:05:37.656474 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:05:37.656509 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:05:37.664948 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:05:37.664991 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:05:37.684828 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:05:37.695597 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:05:37.695656 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:05:37.709178 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:05:37.709233 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:05:37.713734 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:05:37.713781 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:05:37.725549 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:05:37.726041 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:05:37.726123 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:05:37.804558 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:05:37.804658 systemd[1]: Stopped network-cleanup.service. Dec 13 14:05:37.979448 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:05:38.003646 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:05:38.003764 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:05:38.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:38.012507 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:05:38.020785 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:05:38.020837 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:05:38.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:38.035284 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:05:38.049674 systemd[1]: Switching root. Dec 13 14:05:38.075235 iscsid[854]: iscsid shutting down. Dec 13 14:05:38.078527 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Dec 13 14:05:38.078576 systemd-journald[276]: Journal stopped Dec 13 14:06:01.083612 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:06:01.083632 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:06:01.083642 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:06:01.083652 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:06:01.083660 kernel: SELinux: policy capability open_perms=1 Dec 13 14:06:01.083668 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:06:01.083677 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:06:01.083685 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:06:01.083694 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:06:01.083702 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:06:01.083710 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:06:01.083720 systemd[1]: Successfully loaded SELinux policy in 864.441ms. Dec 13 14:06:01.083732 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.169ms. Dec 13 14:06:01.083742 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:06:01.083752 systemd[1]: Detected virtualization microsoft. Dec 13 14:06:01.083762 systemd[1]: Detected architecture arm64. Dec 13 14:06:01.083788 systemd[1]: Detected first boot. Dec 13 14:06:01.083798 systemd[1]: Hostname set to . Dec 13 14:06:01.083807 systemd[1]: Initializing machine ID from random generator. Dec 13 14:06:01.083816 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:06:01.083825 kernel: audit: type=1400 audit(1734098742.725:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:06:01.083835 kernel: audit: type=1400 audit(1734098742.731:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:06:01.083845 kernel: audit: type=1334 audit(1734098742.746:83): prog-id=10 op=LOAD Dec 13 14:06:01.083854 kernel: audit: type=1334 audit(1734098742.746:84): prog-id=10 op=UNLOAD Dec 13 14:06:01.083863 kernel: audit: type=1334 audit(1734098742.762:85): prog-id=11 op=LOAD Dec 13 14:06:01.083871 kernel: audit: type=1334 audit(1734098742.762:86): prog-id=11 op=UNLOAD Dec 13 14:06:01.083880 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:06:01.083889 kernel: audit: type=1400 audit(1734098748.027:87): avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:06:01.083899 kernel: audit: type=1300 audit(1734098748.027:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:01.083910 kernel: audit: type=1327 audit(1734098748.027:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:06:01.083919 kernel: audit: type=1400 audit(1734098748.037:88): avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:06:01.083929 kernel: audit: type=1300 audit(1734098748.037:88): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:01.083938 kernel: audit: type=1307 audit(1734098748.037:88): cwd="/" Dec 13 14:06:01.083948 kernel: audit: type=1302 audit(1734098748.037:88): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:01.083957 kernel: audit: type=1302 audit(1734098748.037:88): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:01.083967 kernel: audit: type=1327 audit(1734098748.037:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:06:01.083977 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:06:01.083986 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:06:01.083996 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:06:01.084006 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:06:01.084017 kernel: audit: type=1334 audit(1734098759.534:89): prog-id=12 op=LOAD Dec 13 14:06:01.084026 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:06:01.084036 kernel: audit: type=1334 audit(1734098759.534:90): prog-id=3 op=UNLOAD Dec 13 14:06:01.084045 systemd[1]: Stopped iscsiuio.service. Dec 13 14:06:01.084054 kernel: audit: type=1334 audit(1734098759.541:91): prog-id=13 op=LOAD Dec 13 14:06:01.084063 kernel: audit: type=1334 audit(1734098759.541:92): prog-id=14 op=LOAD Dec 13 14:06:01.084072 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:06:01.084081 kernel: audit: type=1334 audit(1734098759.541:93): prog-id=4 op=UNLOAD Dec 13 14:06:01.084090 systemd[1]: Stopped iscsid.service. Dec 13 14:06:01.084100 kernel: audit: type=1334 audit(1734098759.541:94): prog-id=5 op=UNLOAD Dec 13 14:06:01.084109 kernel: audit: type=1131 audit(1734098759.543:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.084118 kernel: audit: type=1334 audit(1734098759.559:96): prog-id=12 op=UNLOAD Dec 13 14:06:01.084127 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:06:01.084137 kernel: audit: type=1131 audit(1734098759.564:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.084146 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:06:01.084156 kernel: audit: type=1131 audit(1734098759.613:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.084165 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:06:01.084176 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:06:01.084185 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:06:01.084195 systemd[1]: Created slice system-getty.slice. Dec 13 14:06:01.084204 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:06:01.084213 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:06:01.084223 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:06:01.084232 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:06:01.084241 systemd[1]: Created slice user.slice. Dec 13 14:06:01.084251 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:06:01.084261 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:06:01.084270 systemd[1]: Set up automount boot.automount. Dec 13 14:06:01.084280 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:06:01.084289 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:06:01.084299 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:06:01.084308 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:06:01.084317 systemd[1]: Reached target integritysetup.target. Dec 13 14:06:01.084328 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:06:01.084337 systemd[1]: Reached target remote-fs.target. Dec 13 14:06:01.084347 systemd[1]: Reached target slices.target. Dec 13 14:06:01.084356 systemd[1]: Reached target swap.target. Dec 13 14:06:01.084365 systemd[1]: Reached target torcx.target. Dec 13 14:06:01.084375 systemd[1]: Reached target veritysetup.target. Dec 13 14:06:01.084386 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:06:01.084395 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:06:01.084405 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:06:01.084414 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:06:01.084423 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:06:01.084433 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:06:01.084442 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:06:01.084451 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:06:01.084462 systemd[1]: Mounting media.mount... Dec 13 14:06:01.084471 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:06:01.084481 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:06:01.084491 systemd[1]: Mounting tmp.mount... Dec 13 14:06:01.084500 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:06:01.084509 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:01.084519 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:06:01.084528 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:06:01.084538 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:01.084549 systemd[1]: Starting modprobe@drm.service... Dec 13 14:06:01.084559 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:01.084568 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:06:01.084578 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:01.084587 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:06:01.084597 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:06:01.084606 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:06:01.084616 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:06:01.084625 kernel: fuse: init (API version 7.34) Dec 13 14:06:01.084635 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:06:01.084645 systemd[1]: Stopped systemd-journald.service. Dec 13 14:06:01.084655 systemd[1]: systemd-journald.service: Consumed 3.109s CPU time. Dec 13 14:06:01.084663 kernel: loop: module loaded Dec 13 14:06:01.084673 systemd[1]: Starting systemd-journald.service... Dec 13 14:06:01.084682 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:06:01.084693 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:06:01.084703 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:06:01.084713 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:06:01.084722 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:06:01.084731 systemd[1]: Stopped verity-setup.service. Dec 13 14:06:01.084741 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:06:01.084751 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:06:01.084764 systemd[1]: Mounted media.mount. Dec 13 14:06:01.084799 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:06:01.084810 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:06:01.084819 systemd[1]: Mounted tmp.mount. Dec 13 14:06:01.084830 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:06:01.084840 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:06:01.084849 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:06:01.084859 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:06:01.084869 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:01.084878 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:01.084888 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:06:01.084898 systemd[1]: Finished modprobe@drm.service. Dec 13 14:06:01.084907 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:01.084918 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:01.084928 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:06:01.084938 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:06:01.084947 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:01.084957 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:01.084967 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:06:01.084976 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:06:01.084986 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:06:01.084996 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:06:01.085007 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:06:01.085017 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:06:01.085027 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:06:01.085036 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:06:01.085046 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:06:01.085056 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:06:01.085066 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:06:01.085075 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:06:01.085086 systemd[1]: Reached target network-pre.target. Dec 13 14:06:01.085100 systemd-journald[1182]: Journal started Dec 13 14:06:01.085140 systemd-journald[1182]: Runtime Journal (/run/log/journal/d2adad37872d421f8f78219711948b57) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:05:40.351000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:06:01.094800 systemd[1]: Started systemd-journald.service. Dec 13 14:05:42.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:05:42.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:05:42.746000 audit: BPF prog-id=10 op=LOAD Dec 13 14:05:42.746000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:05:42.762000 audit: BPF prog-id=11 op=LOAD Dec 13 14:05:42.762000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:05:48.027000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:05:48.027000 audit[1076]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:48.027000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:05:48.037000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:05:48.037000 audit[1076]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:48.037000 audit: CWD cwd="/" Dec 13 14:05:48.037000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:48.037000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:48.037000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:05:59.534000 audit: BPF prog-id=12 op=LOAD Dec 13 14:05:59.534000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:05:59.541000 audit: BPF prog-id=13 op=LOAD Dec 13 14:05:59.541000 audit: BPF prog-id=14 op=LOAD Dec 13 14:05:59.541000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:05:59.541000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:05:59.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:59.559000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:05:59.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:59.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:59.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:59.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.176000 audit: BPF prog-id=15 op=LOAD Dec 13 14:06:00.176000 audit: BPF prog-id=16 op=LOAD Dec 13 14:06:00.176000 audit: BPF prog-id=17 op=LOAD Dec 13 14:06:00.176000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:06:00.176000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:06:00.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.080000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:06:01.080000 audit[1182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffcc1c24d0 a2=4000 a3=1 items=0 ppid=1 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:01.080000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:05:59.533760 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:05:48.023888 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:05:59.543911 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:05:48.024390 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:05:59.544268 systemd[1]: systemd-journald.service: Consumed 3.109s CPU time. Dec 13 14:05:48.024415 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:05:48.024453 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:05:48.024462 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:05:48.024490 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:05:48.024501 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:05:48.024706 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:05:48.024738 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:05:48.024749 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:05:48.025080 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:05:48.025115 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:05:48.025132 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:05:48.025146 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:05:48.025161 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:05:48.025174 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:05:59.063449 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:59.063717 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:59.063836 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:59.064004 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:59.064053 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:05:59.064105 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:05:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:06:01.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.100355 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:06:01.113957 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:06:01.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.120151 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:06:01.126863 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:06:01.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.134707 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:06:01.141538 udevadm[1194]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:06:01.675547 systemd-journald[1182]: Time spent on flushing to /var/log/journal/d2adad37872d421f8f78219711948b57 is 13.260ms for 1109 entries. Dec 13 14:06:01.675547 systemd-journald[1182]: System Journal (/var/log/journal/d2adad37872d421f8f78219711948b57) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:06:02.669778 systemd-journald[1182]: Received client request to flush runtime journal. Dec 13 14:06:01.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.725401 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:06:01.926741 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:06:01.931573 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:06:02.670806 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:06:02.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.169808 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:06:04.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.175521 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:06:05.680576 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:06:05.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:05.690435 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 14:06:05.690524 kernel: audit: type=1130 audit(1734098765.684:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:07.186797 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:06:07.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:07.208000 audit: BPF prog-id=18 op=LOAD Dec 13 14:06:07.214548 kernel: audit: type=1130 audit(1734098767.191:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:07.214609 kernel: audit: type=1334 audit(1734098767.208:137): prog-id=18 op=LOAD Dec 13 14:06:07.209718 systemd[1]: Starting systemd-udevd.service... Dec 13 14:06:07.208000 audit: BPF prog-id=19 op=LOAD Dec 13 14:06:07.220123 kernel: audit: type=1334 audit(1734098767.208:138): prog-id=19 op=LOAD Dec 13 14:06:07.208000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:06:07.228492 kernel: audit: type=1334 audit(1734098767.208:139): prog-id=7 op=UNLOAD Dec 13 14:06:07.208000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:06:07.233908 kernel: audit: type=1334 audit(1734098767.208:140): prog-id=8 op=UNLOAD Dec 13 14:06:07.246837 systemd-udevd[1201]: Using default interface naming scheme 'v252'. Dec 13 14:06:07.928043 systemd[1]: Started systemd-udevd.service. Dec 13 14:06:07.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:07.963765 systemd[1]: Starting systemd-networkd.service... Dec 13 14:06:07.974416 kernel: audit: type=1130 audit(1734098767.935:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:07.974519 kernel: audit: type=1334 audit(1734098767.962:142): prog-id=20 op=LOAD Dec 13 14:06:07.962000 audit: BPF prog-id=20 op=LOAD Dec 13 14:06:07.988512 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 14:06:08.266000 audit[1206]: AVC avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:06:08.291811 kernel: audit: type=1400 audit(1734098768.266:143): avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:06:08.291911 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:06:08.291938 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:06:08.300419 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:06:08.305226 kernel: hv_balloon: Memory hot add disabled on ARM64 Dec 13 14:06:08.266000 audit[1206]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad57de1c0 a1=aa2c a2=ffff9f9224b0 a3=aaaad573e010 items=12 ppid=1201 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:08.340471 kernel: audit: type=1300 audit(1734098768.266:143): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad57de1c0 a1=aa2c a2=ffff9f9224b0 a3=aaaad573e010 items=12 ppid=1201 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:08.340584 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:06:08.266000 audit: CWD cwd="/" Dec 13 14:06:08.266000 audit: PATH item=0 name=(null) inode=6710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=1 name=(null) inode=9820 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=2 name=(null) inode=9820 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=3 name=(null) inode=9821 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=4 name=(null) inode=9820 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=5 name=(null) inode=9822 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=6 name=(null) inode=9820 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=7 name=(null) inode=9823 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=8 name=(null) inode=9820 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=9 name=(null) inode=9824 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=10 name=(null) inode=9820 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PATH item=11 name=(null) inode=9825 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:08.266000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:06:08.348804 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:06:08.355792 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:06:08.360809 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:06:08.363800 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:06:08.720000 audit: BPF prog-id=21 op=LOAD Dec 13 14:06:08.720000 audit: BPF prog-id=22 op=LOAD Dec 13 14:06:08.720000 audit: BPF prog-id=23 op=LOAD Dec 13 14:06:08.722366 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:06:08.751436 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:06:08.751718 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:06:08.757897 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:06:08.757989 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:06:08.758011 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:06:09.190492 systemd[1]: Started systemd-userdbd.service. Dec 13 14:06:09.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:10.523772 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1214) Dec 13 14:06:10.540355 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:06:10.549093 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:06:10.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:10.554737 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:06:10.751851 systemd-networkd[1220]: lo: Link UP Dec 13 14:06:10.751861 systemd-networkd[1220]: lo: Gained carrier Dec 13 14:06:10.752232 systemd-networkd[1220]: Enumeration completed Dec 13 14:06:10.752414 systemd[1]: Started systemd-networkd.service. Dec 13 14:06:10.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:10.758173 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:06:10.887104 systemd-networkd[1220]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:06:10.936732 kernel: mlx5_core 2aff:00:02.0 enP11007s1: Link up Dec 13 14:06:10.962727 kernel: hv_netvsc 00224878-0f19-0022-4878-0f1900224878 eth0: Data path switched to VF: enP11007s1 Dec 13 14:06:10.963144 systemd-networkd[1220]: enP11007s1: Link UP Dec 13 14:06:10.963341 systemd-networkd[1220]: eth0: Link UP Dec 13 14:06:10.963453 systemd-networkd[1220]: eth0: Gained carrier Dec 13 14:06:10.971022 systemd-networkd[1220]: enP11007s1: Gained carrier Dec 13 14:06:10.978804 systemd-networkd[1220]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:06:11.950274 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:06:11.977641 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:06:11.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:11.982432 systemd[1]: Reached target cryptsetup.target. Dec 13 14:06:11.986164 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:06:11.986206 kernel: audit: type=1130 audit(1734098771.981:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.006883 systemd[1]: Starting lvm2-activation.service... Dec 13 14:06:12.010689 lvm[1279]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:06:12.039603 systemd[1]: Finished lvm2-activation.service. Dec 13 14:06:12.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.044859 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:06:12.064120 kernel: audit: type=1130 audit(1734098772.043:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.064553 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:06:12.064671 systemd[1]: Reached target local-fs.target. Dec 13 14:06:12.069329 systemd[1]: Reached target machines.target. Dec 13 14:06:12.075076 systemd[1]: Starting ldconfig.service... Dec 13 14:06:12.079006 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:12.079170 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:12.080282 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:06:12.085510 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:06:12.091747 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:06:12.097666 systemd[1]: Starting systemd-sysext.service... Dec 13 14:06:12.543094 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1281 (bootctl) Dec 13 14:06:12.544400 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:06:12.654909 systemd-networkd[1220]: eth0: Gained IPv6LL Dec 13 14:06:12.888148 kernel: audit: type=1130 audit(1734098772.664:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.888209 kernel: audit: type=1130 audit(1734098772.852:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:12.659601 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:06:12.749415 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:06:12.843239 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:06:12.843419 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:06:12.848753 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:06:12.943735 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 14:06:13.098735 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:06:13.121741 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 14:06:13.125548 (sd-sysext)[1293]: Using extensions 'kubernetes'. Dec 13 14:06:13.125925 (sd-sysext)[1293]: Merged extensions into '/usr'. Dec 13 14:06:13.142038 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:06:13.146349 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.147761 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:13.153077 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:13.158302 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:13.162165 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.162382 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:13.164689 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:06:13.169614 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:13.169887 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:13.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.174597 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:13.174886 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:13.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.210497 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:13.210740 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:13.211228 kernel: audit: type=1130 audit(1734098773.172:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.211270 kernel: audit: type=1131 audit(1734098773.172:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.245430 kernel: audit: type=1130 audit(1734098773.209:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.245537 kernel: audit: type=1131 audit(1734098773.209:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.250553 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:06:13.250660 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.284922 kernel: audit: type=1130 audit(1734098773.248:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.284978 kernel: audit: type=1131 audit(1734098773.248:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.268118 systemd[1]: Finished systemd-sysext.service. Dec 13 14:06:13.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.290225 systemd[1]: Starting ensure-sysext.service... Dec 13 14:06:13.294654 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:06:13.302631 systemd[1]: Reloading. Dec 13 14:06:13.308663 systemd-tmpfiles[1300]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:06:13.353524 /usr/lib/systemd/system-generators/torcx-generator[1320]: time="2024-12-13T14:06:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:06:13.353852 /usr/lib/systemd/system-generators/torcx-generator[1320]: time="2024-12-13T14:06:13Z" level=info msg="torcx already run" Dec 13 14:06:13.429210 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:06:13.429232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:06:13.440574 systemd-tmpfiles[1300]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:06:13.444524 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:06:13.503000 audit: BPF prog-id=24 op=LOAD Dec 13 14:06:13.503000 audit: BPF prog-id=25 op=LOAD Dec 13 14:06:13.503000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:06:13.504000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:06:13.506000 audit: BPF prog-id=26 op=LOAD Dec 13 14:06:13.506000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:06:13.506000 audit: BPF prog-id=27 op=LOAD Dec 13 14:06:13.506000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:06:13.506000 audit: BPF prog-id=28 op=LOAD Dec 13 14:06:13.506000 audit: BPF prog-id=29 op=LOAD Dec 13 14:06:13.506000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:06:13.506000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:06:13.507000 audit: BPF prog-id=30 op=LOAD Dec 13 14:06:13.507000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:06:13.507000 audit: BPF prog-id=31 op=LOAD Dec 13 14:06:13.507000 audit: BPF prog-id=32 op=LOAD Dec 13 14:06:13.507000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:06:13.507000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:06:13.520024 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.521174 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:13.526170 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:13.531169 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:13.535256 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.535380 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:13.536273 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:13.536409 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:13.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.540964 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:13.541080 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:13.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.545976 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:13.546091 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:13.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.552053 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.553224 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:13.557988 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:13.562961 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:13.567004 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.567118 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:13.567958 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:13.568077 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:13.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.572617 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:13.572747 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:13.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.577670 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:13.577895 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:13.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.584393 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.585601 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:13.590240 systemd[1]: Starting modprobe@drm.service... Dec 13 14:06:13.594777 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:13.599678 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:13.603253 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.603369 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:13.604270 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:13.604391 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:13.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.608785 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:06:13.608891 systemd[1]: Finished modprobe@drm.service. Dec 13 14:06:13.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.613394 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:13.613504 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:13.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.618320 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:13.618425 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:13.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.623040 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:06:13.623108 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:06:13.624203 systemd[1]: Finished ensure-sysext.service. Dec 13 14:06:13.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.883971 systemd-tmpfiles[1300]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:06:13.901155 systemd-fsck[1289]: fsck.fat 4.2 (2021-01-31) Dec 13 14:06:13.901155 systemd-fsck[1289]: /dev/sda1: 236 files, 117175/258078 clusters Dec 13 14:06:13.902972 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:06:13.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:13.910266 systemd[1]: Mounting boot.mount... Dec 13 14:06:14.342533 systemd[1]: Mounted boot.mount. Dec 13 14:06:14.352671 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:06:14.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.307511 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:06:17.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.317133 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 14:06:17.317189 kernel: audit: type=1130 audit(1734098777.311:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.318555 systemd[1]: Starting audit-rules.service... Dec 13 14:06:17.340505 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:06:17.345878 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:06:17.349000 audit: BPF prog-id=33 op=LOAD Dec 13 14:06:17.352404 systemd[1]: Starting systemd-resolved.service... Dec 13 14:06:17.360746 kernel: audit: type=1334 audit(1734098777.349:203): prog-id=33 op=LOAD Dec 13 14:06:17.360000 audit: BPF prog-id=34 op=LOAD Dec 13 14:06:17.362933 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:06:17.370905 kernel: audit: type=1334 audit(1734098777.360:204): prog-id=34 op=LOAD Dec 13 14:06:17.372355 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:06:17.437000 audit[1400]: SYSTEM_BOOT pid=1400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.441968 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:06:17.461412 kernel: audit: type=1127 audit(1734098777.437:205): pid=1400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.461492 kernel: audit: type=1130 audit(1734098777.459:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.849184 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:06:17.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.853625 systemd[1]: Reached target time-set.target. Dec 13 14:06:17.874795 kernel: audit: type=1130 audit(1734098777.851:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.540916 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:06:18.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.545788 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:06:18.563740 kernel: audit: type=1130 audit(1734098778.544:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.746448 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:06:18.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.770730 kernel: audit: type=1130 audit(1734098778.749:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:19.243184 kernel: audit: type=1130 audit(1734098779.139:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:19.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.835298 systemd-resolved[1398]: Positive Trust Anchors: Dec 13 14:06:18.835342 systemd-resolved[1398]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:06:18.835373 systemd-resolved[1398]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:06:19.134203 systemd-resolved[1398]: Using system hostname 'ci-3510.3.6-a-52bcbbb462'. Dec 13 14:06:19.136003 systemd[1]: Started systemd-resolved.service. Dec 13 14:06:19.140886 systemd[1]: Reached target network.target. Dec 13 14:06:19.162169 systemd[1]: Reached target network-online.target. Dec 13 14:06:19.166890 systemd[1]: Reached target nss-lookup.target. Dec 13 14:06:19.791631 systemd-timesyncd[1399]: Contacted time server 198.23.249.167:123 (0.flatcar.pool.ntp.org). Dec 13 14:06:19.791705 systemd-timesyncd[1399]: Initial clock synchronization to Fri 2024-12-13 14:06:19.362111 UTC. Dec 13 14:06:20.544000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:06:20.549391 augenrules[1416]: No rules Dec 13 14:06:20.559281 systemd[1]: Finished audit-rules.service. Dec 13 14:06:20.544000 audit[1416]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd23a47e0 a2=420 a3=0 items=0 ppid=1395 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:20.544000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:06:20.561730 kernel: audit: type=1305 audit(1734098780.544:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:06:20.615443 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:06:20.616030 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:06:22.206490 ldconfig[1280]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:06:22.215017 systemd[1]: Finished ldconfig.service. Dec 13 14:06:22.220507 systemd[1]: Starting systemd-update-done.service... Dec 13 14:06:22.232739 systemd[1]: Finished systemd-update-done.service. Dec 13 14:06:22.237497 systemd[1]: Reached target sysinit.target. Dec 13 14:06:22.241720 systemd[1]: Started motdgen.path. Dec 13 14:06:22.245254 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:06:22.251334 systemd[1]: Started logrotate.timer. Dec 13 14:06:22.255149 systemd[1]: Started mdadm.timer. Dec 13 14:06:22.258489 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:06:22.262893 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:06:22.262924 systemd[1]: Reached target paths.target. Dec 13 14:06:22.267061 systemd[1]: Reached target timers.target. Dec 13 14:06:22.271570 systemd[1]: Listening on dbus.socket. Dec 13 14:06:22.276348 systemd[1]: Starting docker.socket... Dec 13 14:06:22.282447 systemd[1]: Listening on sshd.socket. Dec 13 14:06:22.286231 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:22.286644 systemd[1]: Listening on docker.socket. Dec 13 14:06:22.290561 systemd[1]: Reached target sockets.target. Dec 13 14:06:22.294749 systemd[1]: Reached target basic.target. Dec 13 14:06:22.299195 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:06:22.299226 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:06:22.300184 systemd[1]: Starting containerd.service... Dec 13 14:06:22.304385 systemd[1]: Starting dbus.service... Dec 13 14:06:22.308212 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:06:22.313251 systemd[1]: Starting extend-filesystems.service... Dec 13 14:06:22.319724 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:06:22.320763 systemd[1]: Starting kubelet.service... Dec 13 14:06:22.322536 jq[1426]: false Dec 13 14:06:22.324942 systemd[1]: Starting motdgen.service... Dec 13 14:06:22.329184 systemd[1]: Started nvidia.service. Dec 13 14:06:22.334883 systemd[1]: Starting prepare-helm.service... Dec 13 14:06:22.340312 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:06:22.345731 extend-filesystems[1427]: Found loop1 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda1 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda2 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda3 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found usr Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda4 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda6 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda7 Dec 13 14:06:22.345731 extend-filesystems[1427]: Found sda9 Dec 13 14:06:22.345731 extend-filesystems[1427]: Checking size of /dev/sda9 Dec 13 14:06:22.446500 dbus-daemon[1425]: [system] SELinux support is enabled Dec 13 14:06:22.346863 systemd[1]: Starting sshd-keygen.service... Dec 13 14:06:22.519104 extend-filesystems[1427]: Old size kept for /dev/sda9 Dec 13 14:06:22.519104 extend-filesystems[1427]: Found sr0 Dec 13 14:06:22.358298 systemd[1]: Starting systemd-logind.service... Dec 13 14:06:22.370549 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:22.370607 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:06:22.535881 jq[1453]: true Dec 13 14:06:22.371016 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:06:22.371623 systemd[1]: Starting update-engine.service... Dec 13 14:06:22.379424 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:06:22.537312 tar[1456]: linux-arm64/helm Dec 13 14:06:22.385496 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:06:22.538709 jq[1457]: true Dec 13 14:06:22.385670 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:06:22.389741 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:06:22.390090 systemd[1]: Finished motdgen.service. Dec 13 14:06:22.394914 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:06:22.395086 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:06:22.434558 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:06:22.434710 systemd[1]: Finished extend-filesystems.service. Dec 13 14:06:22.446629 systemd[1]: Started dbus.service. Dec 13 14:06:22.461163 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:06:22.461184 systemd[1]: Reached target system-config.target. Dec 13 14:06:22.467786 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:06:22.467804 systemd[1]: Reached target user-config.target. Dec 13 14:06:22.493463 systemd-logind[1445]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:06:22.493746 systemd-logind[1445]: New seat seat0. Dec 13 14:06:22.495030 systemd[1]: Started systemd-logind.service. Dec 13 14:06:22.552514 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:06:22.582830 env[1458]: time="2024-12-13T14:06:22.582772028Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:06:22.647212 env[1458]: time="2024-12-13T14:06:22.647170318Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:06:22.647345 env[1458]: time="2024-12-13T14:06:22.647308844Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654132289Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654163690Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654396340Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654413941Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654426821Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654436662Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654507865Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654705553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654837879Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:06:22.655013 env[1458]: time="2024-12-13T14:06:22.654852959Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:06:22.655257 env[1458]: time="2024-12-13T14:06:22.654903161Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:06:22.655257 env[1458]: time="2024-12-13T14:06:22.654916522Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:06:22.885862 bash[1487]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:06:22.886377 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.294970296Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295015457Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295030018Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295068139Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295083860Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295097621Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295110501Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295441394Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295457995Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295471515Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295483236Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295496436Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295629961Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:06:23.297114 env[1458]: time="2024-12-13T14:06:23.295706844Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.295974015Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.295999376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296011976Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296053018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296064418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296075939Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296088899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296105060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296117901Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296128381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296138861Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296152822Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296270907Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296286947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297465 env[1458]: time="2024-12-13T14:06:23.296301588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297800 env[1458]: time="2024-12-13T14:06:23.296313828Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:06:23.297800 env[1458]: time="2024-12-13T14:06:23.296328549Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:06:23.297800 env[1458]: time="2024-12-13T14:06:23.296339189Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:06:23.297800 env[1458]: time="2024-12-13T14:06:23.296356950Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:06:23.297800 env[1458]: time="2024-12-13T14:06:23.296391431Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:06:23.297903 env[1458]: time="2024-12-13T14:06:23.296593919Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:06:23.297903 env[1458]: time="2024-12-13T14:06:23.296645521Z" level=info msg="Connect containerd service" Dec 13 14:06:23.297903 env[1458]: time="2024-12-13T14:06:23.296673442Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.297936052Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298046576Z" level=info msg="Start subscribing containerd event" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298088458Z" level=info msg="Start recovering state" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298144460Z" level=info msg="Start event monitor" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298160661Z" level=info msg="Start snapshots syncer" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298169901Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298177101Z" level=info msg="Start streaming server" Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298505314Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.298580517Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:06:23.306280 env[1458]: time="2024-12-13T14:06:23.301920768Z" level=info msg="containerd successfully booted in 0.775485s" Dec 13 14:06:23.301989 systemd[1]: Started containerd.service. Dec 13 14:06:23.507271 tar[1456]: linux-arm64/LICENSE Dec 13 14:06:23.507414 tar[1456]: linux-arm64/README.md Dec 13 14:06:23.512454 systemd[1]: Finished prepare-helm.service. Dec 13 14:06:23.630671 systemd[1]: Started kubelet.service. Dec 13 14:06:23.987695 update_engine[1452]: I1213 14:06:23.689524 1452 main.cc:92] Flatcar Update Engine starting Dec 13 14:06:24.080259 kubelet[1536]: E1213 14:06:24.080180 1536 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:24.082484 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:24.082604 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:24.287939 systemd[1]: Started update-engine.service. Dec 13 14:06:24.288235 update_engine[1452]: I1213 14:06:24.287961 1452 update_check_scheduler.cc:74] Next update check in 10m9s Dec 13 14:06:24.293994 systemd[1]: Started locksmithd.service. Dec 13 14:06:24.336741 sshd_keygen[1448]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:06:24.352944 systemd[1]: Finished sshd-keygen.service. Dec 13 14:06:24.358390 systemd[1]: Starting issuegen.service... Dec 13 14:06:24.362728 systemd[1]: Started waagent.service. Dec 13 14:06:24.368256 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:06:24.368405 systemd[1]: Finished issuegen.service. Dec 13 14:06:24.373374 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:06:24.449596 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:06:24.455676 systemd[1]: Started getty@tty1.service. Dec 13 14:06:24.461281 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 14:06:24.465870 systemd[1]: Reached target getty.target. Dec 13 14:06:24.469670 systemd[1]: Reached target multi-user.target. Dec 13 14:06:24.475151 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:06:24.483120 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:06:24.483261 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:06:24.488511 systemd[1]: Startup finished in 705ms (kernel) + 17.666s (initrd) + 44.820s (userspace) = 1min 3.192s. Dec 13 14:06:27.843850 login[1556]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:06:27.844966 login[1557]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:06:28.291657 systemd[1]: Created slice user-500.slice. Dec 13 14:06:28.292785 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:06:28.294997 systemd-logind[1445]: New session 1 of user core. Dec 13 14:06:28.647459 (systemd)[1563]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:28.297479 systemd-logind[1445]: New session 2 of user core. Dec 13 14:06:28.450682 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:06:28.452131 systemd[1]: Starting user@500.service... Dec 13 14:06:30.146380 systemd[1563]: Queued start job for default target default.target. Dec 13 14:06:30.146899 systemd[1563]: Reached target paths.target. Dec 13 14:06:30.146918 systemd[1563]: Reached target sockets.target. Dec 13 14:06:30.146929 systemd[1563]: Reached target timers.target. Dec 13 14:06:30.146939 systemd[1563]: Reached target basic.target. Dec 13 14:06:30.146982 systemd[1563]: Reached target default.target. Dec 13 14:06:30.147005 systemd[1563]: Startup finished in 1.493s. Dec 13 14:06:30.147052 systemd[1]: Started user@500.service. Dec 13 14:06:30.148007 systemd[1]: Started session-1.scope. Dec 13 14:06:30.148565 systemd[1]: Started session-2.scope. Dec 13 14:06:32.039605 locksmithd[1542]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:06:34.181813 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:06:34.181982 systemd[1]: Stopped kubelet.service. Dec 13 14:06:34.183361 systemd[1]: Starting kubelet.service... Dec 13 14:06:39.103666 systemd[1]: Started kubelet.service. Dec 13 14:06:39.153293 kubelet[1586]: E1213 14:06:39.153245 1586 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:39.157273 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:39.157402 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:39.922223 waagent[1553]: 2024-12-13T14:06:39.922110Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:06:39.928233 waagent[1553]: 2024-12-13T14:06:39.928148Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:06:39.934723 waagent[1553]: 2024-12-13T14:06:39.934641Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:06:39.940082 waagent[1553]: 2024-12-13T14:06:39.939997Z INFO Daemon Daemon Run daemon Dec 13 14:06:39.944680 waagent[1553]: 2024-12-13T14:06:39.944601Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:06:39.961930 waagent[1553]: 2024-12-13T14:06:39.961781Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:06:39.976740 waagent[1553]: 2024-12-13T14:06:39.976587Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:06:39.986422 waagent[1553]: 2024-12-13T14:06:39.986336Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:06:39.991633 waagent[1553]: 2024-12-13T14:06:39.991553Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:06:39.997496 waagent[1553]: 2024-12-13T14:06:39.997425Z INFO Daemon Daemon Activate resource disk Dec 13 14:06:40.002355 waagent[1553]: 2024-12-13T14:06:40.002286Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:06:40.017023 waagent[1553]: 2024-12-13T14:06:40.016936Z INFO Daemon Daemon Found device: None Dec 13 14:06:40.021632 waagent[1553]: 2024-12-13T14:06:40.021563Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:06:40.030801 waagent[1553]: 2024-12-13T14:06:40.030723Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:06:40.042398 waagent[1553]: 2024-12-13T14:06:40.042332Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:06:40.048073 waagent[1553]: 2024-12-13T14:06:40.048007Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:06:40.061029 waagent[1553]: 2024-12-13T14:06:40.060876Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:06:40.076475 waagent[1553]: 2024-12-13T14:06:40.076331Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:06:40.086540 waagent[1553]: 2024-12-13T14:06:40.086461Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:06:40.092026 waagent[1553]: 2024-12-13T14:06:40.091951Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:06:40.132671 waagent[1553]: 2024-12-13T14:06:40.132518Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:06:40.162790 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:06:40.175628 waagent[1553]: 2024-12-13T14:06:40.175418Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:06:40.180646 waagent[1553]: 2024-12-13T14:06:40.180561Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:06:40.186588 waagent[1553]: 2024-12-13T14:06:40.186510Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:06:40.192925 waagent[1553]: 2024-12-13T14:06:40.192851Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:06:40.198295 waagent[1553]: 2024-12-13T14:06:40.198228Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:06:40.203238 waagent[1553]: 2024-12-13T14:06:40.203173Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:06:40.236521 waagent[1553]: 2024-12-13T14:06:40.236450Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:06:40.243745 waagent[1553]: 2024-12-13T14:06:40.243684Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:06:40.249198 waagent[1553]: 2024-12-13T14:06:40.249119Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:06:40.950623 waagent[1553]: 2024-12-13T14:06:40.950478Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:06:40.966562 waagent[1553]: 2024-12-13T14:06:40.966479Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:06:40.972361 waagent[1553]: 2024-12-13T14:06:40.972274Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:06:41.055706 waagent[1553]: 2024-12-13T14:06:41.055573Z INFO Daemon Daemon Found private key matching thumbprint D50069850D28EB9CCA7E4D4C35A58ACE7923BE8E Dec 13 14:06:41.067858 waagent[1553]: 2024-12-13T14:06:41.067764Z INFO Daemon Daemon Certificate with thumbprint 4119D68762CF6E0262E4728F9ADE3245185ACB98 has no matching private key. Dec 13 14:06:41.077887 waagent[1553]: 2024-12-13T14:06:41.077799Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:06:41.132194 waagent[1553]: 2024-12-13T14:06:41.132135Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2bb0d1af-7628-4f6f-84c0-8c894a7a86ea New eTag: 10223409424399978380] Dec 13 14:06:41.144087 waagent[1553]: 2024-12-13T14:06:41.143999Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:06:41.160445 waagent[1553]: 2024-12-13T14:06:41.160364Z INFO Daemon Daemon Starting provisioning Dec 13 14:06:41.165818 waagent[1553]: 2024-12-13T14:06:41.165721Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:06:41.170771 waagent[1553]: 2024-12-13T14:06:41.170671Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-52bcbbb462] Dec 13 14:06:41.187190 waagent[1553]: 2024-12-13T14:06:41.187058Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-52bcbbb462] Dec 13 14:06:41.194181 waagent[1553]: 2024-12-13T14:06:41.194075Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:06:41.200752 waagent[1553]: 2024-12-13T14:06:41.200617Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:06:41.217165 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:06:41.217337 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:06:41.217393 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:06:41.217626 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:06:41.221772 systemd-networkd[1220]: eth0: DHCPv6 lease lost Dec 13 14:06:41.223164 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:06:41.223326 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:06:41.225284 systemd[1]: Starting systemd-networkd.service... Dec 13 14:06:41.252967 systemd-networkd[1616]: enP11007s1: Link UP Dec 13 14:06:41.252978 systemd-networkd[1616]: enP11007s1: Gained carrier Dec 13 14:06:41.253851 systemd-networkd[1616]: eth0: Link UP Dec 13 14:06:41.253861 systemd-networkd[1616]: eth0: Gained carrier Dec 13 14:06:41.254167 systemd-networkd[1616]: lo: Link UP Dec 13 14:06:41.254177 systemd-networkd[1616]: lo: Gained carrier Dec 13 14:06:41.254398 systemd-networkd[1616]: eth0: Gained IPv6LL Dec 13 14:06:41.254610 systemd-networkd[1616]: Enumeration completed Dec 13 14:06:41.254736 systemd[1]: Started systemd-networkd.service. Dec 13 14:06:41.255470 systemd-networkd[1616]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:06:41.256690 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:06:41.261661 waagent[1553]: 2024-12-13T14:06:41.260633Z INFO Daemon Daemon Create user account if not exists Dec 13 14:06:41.267213 waagent[1553]: 2024-12-13T14:06:41.267122Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:06:41.273153 waagent[1553]: 2024-12-13T14:06:41.273060Z INFO Daemon Daemon Configure sudoer Dec 13 14:06:41.278071 waagent[1553]: 2024-12-13T14:06:41.277998Z INFO Daemon Daemon Configure sshd Dec 13 14:06:41.282162 waagent[1553]: 2024-12-13T14:06:41.282085Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:06:41.287838 systemd-networkd[1616]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:06:41.290409 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:06:42.388658 waagent[1553]: 2024-12-13T14:06:42.388570Z INFO Daemon Daemon Provisioning complete Dec 13 14:06:42.411527 waagent[1553]: 2024-12-13T14:06:42.411459Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:06:42.417801 waagent[1553]: 2024-12-13T14:06:42.417699Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:06:42.428341 waagent[1553]: 2024-12-13T14:06:42.428251Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:06:42.733291 waagent[1626]: 2024-12-13T14:06:42.733195Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:06:42.734086 waagent[1626]: 2024-12-13T14:06:42.734026Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:42.734225 waagent[1626]: 2024-12-13T14:06:42.734178Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:42.747458 waagent[1626]: 2024-12-13T14:06:42.747371Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:06:42.747654 waagent[1626]: 2024-12-13T14:06:42.747600Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:06:42.818442 waagent[1626]: 2024-12-13T14:06:42.818298Z INFO ExtHandler ExtHandler Found private key matching thumbprint D50069850D28EB9CCA7E4D4C35A58ACE7923BE8E Dec 13 14:06:42.818663 waagent[1626]: 2024-12-13T14:06:42.818610Z INFO ExtHandler ExtHandler Certificate with thumbprint 4119D68762CF6E0262E4728F9ADE3245185ACB98 has no matching private key. Dec 13 14:06:42.818907 waagent[1626]: 2024-12-13T14:06:42.818859Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:06:42.833511 waagent[1626]: 2024-12-13T14:06:42.833454Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 0560f0f2-fb44-41bb-97c7-e6222d383722 New eTag: 10223409424399978380] Dec 13 14:06:42.834151 waagent[1626]: 2024-12-13T14:06:42.834092Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:06:42.874846 waagent[1626]: 2024-12-13T14:06:42.874675Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:06:42.885039 waagent[1626]: 2024-12-13T14:06:42.884955Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1626 Dec 13 14:06:42.888932 waagent[1626]: 2024-12-13T14:06:42.888856Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:06:42.890321 waagent[1626]: 2024-12-13T14:06:42.890261Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:06:42.921032 waagent[1626]: 2024-12-13T14:06:42.920965Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:06:42.921462 waagent[1626]: 2024-12-13T14:06:42.921403Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:06:42.929858 waagent[1626]: 2024-12-13T14:06:42.929790Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:06:42.930438 waagent[1626]: 2024-12-13T14:06:42.930378Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:06:42.931636 waagent[1626]: 2024-12-13T14:06:42.931570Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:06:42.933055 waagent[1626]: 2024-12-13T14:06:42.932981Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:06:42.933731 waagent[1626]: 2024-12-13T14:06:42.933655Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:42.934007 waagent[1626]: 2024-12-13T14:06:42.933954Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:42.934671 waagent[1626]: 2024-12-13T14:06:42.934615Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:06:42.935086 waagent[1626]: 2024-12-13T14:06:42.935030Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:06:42.935086 waagent[1626]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:06:42.935086 waagent[1626]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:06:42.935086 waagent[1626]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:06:42.935086 waagent[1626]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:42.935086 waagent[1626]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:42.935086 waagent[1626]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:42.937649 waagent[1626]: 2024-12-13T14:06:42.937475Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:06:42.938557 waagent[1626]: 2024-12-13T14:06:42.938490Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:42.938887 waagent[1626]: 2024-12-13T14:06:42.938833Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:42.939570 waagent[1626]: 2024-12-13T14:06:42.939508Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:06:42.939838 waagent[1626]: 2024-12-13T14:06:42.939786Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:06:42.940062 waagent[1626]: 2024-12-13T14:06:42.940016Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:06:42.941233 waagent[1626]: 2024-12-13T14:06:42.941171Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:06:42.941340 waagent[1626]: 2024-12-13T14:06:42.941268Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:06:42.942149 waagent[1626]: 2024-12-13T14:06:42.942063Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:06:42.942249 waagent[1626]: 2024-12-13T14:06:42.942180Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:06:42.942834 waagent[1626]: 2024-12-13T14:06:42.942753Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:06:42.956092 waagent[1626]: 2024-12-13T14:06:42.956007Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:06:42.956820 waagent[1626]: 2024-12-13T14:06:42.956755Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:06:42.957897 waagent[1626]: 2024-12-13T14:06:42.957825Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:06:42.967614 waagent[1626]: 2024-12-13T14:06:42.967542Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1616' Dec 13 14:06:42.984443 waagent[1626]: 2024-12-13T14:06:42.984261Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:06:42.984443 waagent[1626]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:06:42.984443 waagent[1626]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:06:42.984443 waagent[1626]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:0f:19 brd ff:ff:ff:ff:ff:ff Dec 13 14:06:42.984443 waagent[1626]: 3: enP11007s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:0f:19 brd ff:ff:ff:ff:ff:ff\ altname enP11007p0s2 Dec 13 14:06:42.984443 waagent[1626]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:06:42.984443 waagent[1626]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:06:42.984443 waagent[1626]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:06:42.984443 waagent[1626]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:06:42.984443 waagent[1626]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:06:42.984443 waagent[1626]: 2: eth0 inet6 fe80::222:48ff:fe78:f19/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:06:43.041122 waagent[1626]: 2024-12-13T14:06:43.041050Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:06:43.119976 waagent[1626]: 2024-12-13T14:06:43.119873Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Dec 13 14:06:43.124825 waagent[1626]: 2024-12-13T14:06:43.124679Z INFO EnvHandler ExtHandler Firewall rules: Dec 13 14:06:43.124825 waagent[1626]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:43.124825 waagent[1626]: pkts bytes target prot opt in out source destination Dec 13 14:06:43.124825 waagent[1626]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:43.124825 waagent[1626]: pkts bytes target prot opt in out source destination Dec 13 14:06:43.124825 waagent[1626]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:43.124825 waagent[1626]: pkts bytes target prot opt in out source destination Dec 13 14:06:43.124825 waagent[1626]: 7 364 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:06:43.124825 waagent[1626]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:06:43.126341 waagent[1626]: 2024-12-13T14:06:43.126287Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:06:43.415242 waagent[1626]: 2024-12-13T14:06:43.415132Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:06:44.432084 waagent[1553]: 2024-12-13T14:06:44.431968Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:06:44.440310 waagent[1553]: 2024-12-13T14:06:44.440253Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:06:45.618862 waagent[1665]: 2024-12-13T14:06:45.618767Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:06:45.619528 waagent[1665]: 2024-12-13T14:06:45.619460Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:06:45.619650 waagent[1665]: 2024-12-13T14:06:45.619605Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:06:45.619787 waagent[1665]: 2024-12-13T14:06:45.619743Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Dec 13 14:06:45.627501 waagent[1665]: 2024-12-13T14:06:45.627394Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:06:45.627904 waagent[1665]: 2024-12-13T14:06:45.627852Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:45.628058 waagent[1665]: 2024-12-13T14:06:45.628012Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:45.641332 waagent[1665]: 2024-12-13T14:06:45.641263Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:06:45.650116 waagent[1665]: 2024-12-13T14:06:45.650065Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:06:45.651084 waagent[1665]: 2024-12-13T14:06:45.651027Z INFO ExtHandler Dec 13 14:06:45.651228 waagent[1665]: 2024-12-13T14:06:45.651182Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 8589ca9f-7dbe-4f20-babb-5c1199f76b32 eTag: 10223409424399978380 source: Fabric] Dec 13 14:06:45.651954 waagent[1665]: 2024-12-13T14:06:45.651897Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:06:45.653158 waagent[1665]: 2024-12-13T14:06:45.653099Z INFO ExtHandler Dec 13 14:06:45.653287 waagent[1665]: 2024-12-13T14:06:45.653242Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:06:45.659759 waagent[1665]: 2024-12-13T14:06:45.659698Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:06:45.660190 waagent[1665]: 2024-12-13T14:06:45.660141Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:06:45.683571 waagent[1665]: 2024-12-13T14:06:45.683512Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:06:45.751311 waagent[1665]: 2024-12-13T14:06:45.751178Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D50069850D28EB9CCA7E4D4C35A58ACE7923BE8E', 'hasPrivateKey': True} Dec 13 14:06:45.755243 waagent[1665]: 2024-12-13T14:06:45.755177Z INFO ExtHandler Downloaded certificate {'thumbprint': '4119D68762CF6E0262E4728F9ADE3245185ACB98', 'hasPrivateKey': False} Dec 13 14:06:45.756259 waagent[1665]: 2024-12-13T14:06:45.756200Z INFO ExtHandler Fetch goal state completed Dec 13 14:06:45.777595 waagent[1665]: 2024-12-13T14:06:45.777487Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:06:45.789380 waagent[1665]: 2024-12-13T14:06:45.789294Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1665 Dec 13 14:06:45.792637 waagent[1665]: 2024-12-13T14:06:45.792576Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:06:45.793653 waagent[1665]: 2024-12-13T14:06:45.793594Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:06:45.793963 waagent[1665]: 2024-12-13T14:06:45.793909Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:06:45.796126 waagent[1665]: 2024-12-13T14:06:45.796069Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:06:45.800651 waagent[1665]: 2024-12-13T14:06:45.800592Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:06:45.801040 waagent[1665]: 2024-12-13T14:06:45.800981Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:06:45.808829 waagent[1665]: 2024-12-13T14:06:45.808774Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:06:45.809298 waagent[1665]: 2024-12-13T14:06:45.809241Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:06:45.824935 waagent[1665]: 2024-12-13T14:06:45.824834Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Dec 13 14:06:45.827468 waagent[1665]: 2024-12-13T14:06:45.827366Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Dec 13 14:06:45.828623 waagent[1665]: 2024-12-13T14:06:45.828557Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:06:45.830173 waagent[1665]: 2024-12-13T14:06:45.830101Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:06:45.830820 waagent[1665]: 2024-12-13T14:06:45.830758Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:45.831078 waagent[1665]: 2024-12-13T14:06:45.831030Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:45.831770 waagent[1665]: 2024-12-13T14:06:45.831683Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:06:45.832162 waagent[1665]: 2024-12-13T14:06:45.832108Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:06:45.832162 waagent[1665]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:06:45.832162 waagent[1665]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:06:45.832162 waagent[1665]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:06:45.832162 waagent[1665]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:45.832162 waagent[1665]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:45.832162 waagent[1665]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:45.834542 waagent[1665]: 2024-12-13T14:06:45.834384Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:06:45.835142 waagent[1665]: 2024-12-13T14:06:45.835069Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:45.836473 waagent[1665]: 2024-12-13T14:06:45.836398Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:45.838351 waagent[1665]: 2024-12-13T14:06:45.838196Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:06:45.838938 waagent[1665]: 2024-12-13T14:06:45.838866Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:06:45.839160 waagent[1665]: 2024-12-13T14:06:45.839083Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:06:45.839672 waagent[1665]: 2024-12-13T14:06:45.839588Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:06:45.840431 waagent[1665]: 2024-12-13T14:06:45.840336Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:06:45.841014 waagent[1665]: 2024-12-13T14:06:45.840954Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:06:45.841183 waagent[1665]: 2024-12-13T14:06:45.841126Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:06:45.845422 waagent[1665]: 2024-12-13T14:06:45.845351Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:06:45.854334 waagent[1665]: 2024-12-13T14:06:45.854247Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:06:45.854334 waagent[1665]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:06:45.854334 waagent[1665]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:06:45.854334 waagent[1665]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:0f:19 brd ff:ff:ff:ff:ff:ff Dec 13 14:06:45.854334 waagent[1665]: 3: enP11007s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:0f:19 brd ff:ff:ff:ff:ff:ff\ altname enP11007p0s2 Dec 13 14:06:45.854334 waagent[1665]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:06:45.854334 waagent[1665]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:06:45.854334 waagent[1665]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:06:45.854334 waagent[1665]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:06:45.854334 waagent[1665]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:06:45.854334 waagent[1665]: 2: eth0 inet6 fe80::222:48ff:fe78:f19/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:06:45.855175 waagent[1665]: 2024-12-13T14:06:45.855097Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:06:45.876033 waagent[1665]: 2024-12-13T14:06:45.875913Z INFO ExtHandler ExtHandler Dec 13 14:06:45.876517 waagent[1665]: 2024-12-13T14:06:45.876454Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 509c4e7c-be7a-4159-8778-178d452aa356 correlation 92f006ac-20b3-4aa8-9a88-7349cc941abf created: 2024-12-13T14:04:09.837196Z] Dec 13 14:06:45.881202 waagent[1665]: 2024-12-13T14:06:45.881116Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:06:45.892075 waagent[1665]: 2024-12-13T14:06:45.892005Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 16 ms] Dec 13 14:06:45.925579 waagent[1665]: 2024-12-13T14:06:45.925508Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:06:45.950352 waagent[1665]: 2024-12-13T14:06:45.950272Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: D17AFF74-5AC5-4768-9A44-923BF4E52BD1;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:06:45.950561 waagent[1665]: 2024-12-13T14:06:45.950489Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:06:45.950561 waagent[1665]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:45.950561 waagent[1665]: pkts bytes target prot opt in out source destination Dec 13 14:06:45.950561 waagent[1665]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:45.950561 waagent[1665]: pkts bytes target prot opt in out source destination Dec 13 14:06:45.950561 waagent[1665]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:45.950561 waagent[1665]: pkts bytes target prot opt in out source destination Dec 13 14:06:45.950561 waagent[1665]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:06:45.950561 waagent[1665]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:06:45.950561 waagent[1665]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:06:49.181823 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:06:49.181990 systemd[1]: Stopped kubelet.service. Dec 13 14:06:49.183319 systemd[1]: Starting kubelet.service... Dec 13 14:06:49.527241 systemd[1]: Started kubelet.service. Dec 13 14:06:49.569852 kubelet[1709]: E1213 14:06:49.569778 1709 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:49.572384 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:49.572505 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:56.797317 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Dec 13 14:06:59.681788 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:06:59.681961 systemd[1]: Stopped kubelet.service. Dec 13 14:06:59.683339 systemd[1]: Starting kubelet.service... Dec 13 14:06:59.982470 systemd[1]: Started kubelet.service. Dec 13 14:07:00.025367 kubelet[1719]: E1213 14:07:00.025298 1719 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:00.027389 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:00.027509 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:09.310840 update_engine[1452]: I1213 14:07:09.310783 1452 update_attempter.cc:509] Updating boot flags... Dec 13 14:07:10.181831 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:07:10.182003 systemd[1]: Stopped kubelet.service. Dec 13 14:07:10.183557 systemd[1]: Starting kubelet.service... Dec 13 14:07:10.379330 systemd[1]: Started kubelet.service. Dec 13 14:07:10.420401 kubelet[1768]: E1213 14:07:10.420328 1768 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:10.422379 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:10.422503 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:17.206878 systemd[1]: Created slice system-sshd.slice. Dec 13 14:07:17.208664 systemd[1]: Started sshd@0-10.200.20.4:22-10.200.16.10:34146.service. Dec 13 14:07:17.681840 sshd[1775]: Accepted publickey for core from 10.200.16.10 port 34146 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:17.687296 sshd[1775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:17.691473 systemd-logind[1445]: New session 3 of user core. Dec 13 14:07:17.691991 systemd[1]: Started session-3.scope. Dec 13 14:07:18.066139 systemd[1]: Started sshd@1-10.200.20.4:22-10.200.16.10:34158.service. Dec 13 14:07:18.504076 sshd[1780]: Accepted publickey for core from 10.200.16.10 port 34158 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:18.505448 sshd[1780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:18.509536 systemd-logind[1445]: New session 4 of user core. Dec 13 14:07:18.510090 systemd[1]: Started session-4.scope. Dec 13 14:07:18.860619 sshd[1780]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:18.863432 systemd[1]: sshd@1-10.200.20.4:22-10.200.16.10:34158.service: Deactivated successfully. Dec 13 14:07:18.864195 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:07:18.864770 systemd-logind[1445]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:07:18.865777 systemd-logind[1445]: Removed session 4. Dec 13 14:07:18.933664 systemd[1]: Started sshd@2-10.200.20.4:22-10.200.16.10:43346.service. Dec 13 14:07:19.373311 sshd[1786]: Accepted publickey for core from 10.200.16.10 port 43346 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:19.374666 sshd[1786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:19.378665 systemd-logind[1445]: New session 5 of user core. Dec 13 14:07:19.379178 systemd[1]: Started session-5.scope. Dec 13 14:07:19.723889 sshd[1786]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:19.726583 systemd[1]: sshd@2-10.200.20.4:22-10.200.16.10:43346.service: Deactivated successfully. Dec 13 14:07:19.727361 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:07:19.728007 systemd-logind[1445]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:07:19.728891 systemd-logind[1445]: Removed session 5. Dec 13 14:07:19.801822 systemd[1]: Started sshd@3-10.200.20.4:22-10.200.16.10:43352.service. Dec 13 14:07:20.249026 sshd[1792]: Accepted publickey for core from 10.200.16.10 port 43352 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:20.250428 sshd[1792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:20.255061 systemd[1]: Started session-6.scope. Dec 13 14:07:20.255785 systemd-logind[1445]: New session 6 of user core. Dec 13 14:07:20.431659 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:07:20.431858 systemd[1]: Stopped kubelet.service. Dec 13 14:07:20.433443 systemd[1]: Starting kubelet.service... Dec 13 14:07:20.588957 sshd[1792]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:20.592093 systemd[1]: sshd@3-10.200.20.4:22-10.200.16.10:43352.service: Deactivated successfully. Dec 13 14:07:20.592941 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:07:20.593535 systemd-logind[1445]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:07:20.594218 systemd-logind[1445]: Removed session 6. Dec 13 14:07:20.654147 systemd[1]: Started sshd@4-10.200.20.4:22-10.200.16.10:43364.service. Dec 13 14:07:20.819643 systemd[1]: Started kubelet.service. Dec 13 14:07:20.865154 kubelet[1804]: E1213 14:07:20.865007 1804 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:20.867612 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:20.867770 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:21.064707 sshd[1800]: Accepted publickey for core from 10.200.16.10 port 43364 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:21.066131 sshd[1800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:21.070304 systemd-logind[1445]: New session 7 of user core. Dec 13 14:07:21.070811 systemd[1]: Started session-7.scope. Dec 13 14:07:21.354667 sudo[1811]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:07:21.355366 sudo[1811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:21.371944 dbus-daemon[1425]: avc: received setenforce notice (enforcing=1) Dec 13 14:07:21.373808 sudo[1811]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:21.446375 sshd[1800]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:21.450228 systemd[1]: sshd@4-10.200.20.4:22-10.200.16.10:43364.service: Deactivated successfully. Dec 13 14:07:21.450565 systemd-logind[1445]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:07:21.451076 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:07:21.452095 systemd-logind[1445]: Removed session 7. Dec 13 14:07:21.521906 systemd[1]: Started sshd@5-10.200.20.4:22-10.200.16.10:43370.service. Dec 13 14:07:21.952583 sshd[1815]: Accepted publickey for core from 10.200.16.10 port 43370 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:21.954402 sshd[1815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:21.958957 systemd[1]: Started session-8.scope. Dec 13 14:07:21.959722 systemd-logind[1445]: New session 8 of user core. Dec 13 14:07:22.200600 sudo[1819]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:07:22.200856 sudo[1819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:22.203786 sudo[1819]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:22.208995 sudo[1818]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:07:22.209542 sudo[1818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:22.218907 systemd[1]: Stopping audit-rules.service... Dec 13 14:07:22.219000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:07:22.220991 auditctl[1822]: No rules Dec 13 14:07:22.224308 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:07:22.224382 kernel: audit: type=1305 audit(1734098842.219:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:07:22.224691 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:07:22.224903 systemd[1]: Stopped audit-rules.service. Dec 13 14:07:22.226727 systemd[1]: Starting audit-rules.service... Dec 13 14:07:22.219000 audit[1822]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff9634f50 a2=420 a3=0 items=0 ppid=1 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:22.256139 kernel: audit: type=1300 audit(1734098842.219:212): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff9634f50 a2=420 a3=0 items=0 ppid=1 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:22.219000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:07:22.262636 kernel: audit: type=1327 audit(1734098842.219:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:07:22.262816 kernel: audit: type=1131 audit(1734098842.223:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.274912 augenrules[1839]: No rules Dec 13 14:07:22.275971 systemd[1]: Finished audit-rules.service. Dec 13 14:07:22.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.278929 sudo[1818]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:22.293821 kernel: audit: type=1130 audit(1734098842.273:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.278000 audit[1818]: USER_END pid=1818 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.311141 kernel: audit: type=1106 audit(1734098842.278:215): pid=1818 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.278000 audit[1818]: CRED_DISP pid=1818 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.327242 kernel: audit: type=1104 audit(1734098842.278:216): pid=1818 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.364457 sshd[1815]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:22.364000 audit[1815]: USER_END pid=1815 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.387044 systemd[1]: sshd@5-10.200.20.4:22-10.200.16.10:43370.service: Deactivated successfully. Dec 13 14:07:22.364000 audit[1815]: CRED_DISP pid=1815 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.387769 kernel: audit: type=1106 audit(1734098842.364:217): pid=1815 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.387885 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:07:22.405127 systemd-logind[1445]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:07:22.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.16.10:43370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.421778 kernel: audit: type=1104 audit(1734098842.364:218): pid=1815 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.421863 kernel: audit: type=1131 audit(1734098842.386:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.16.10:43370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.422399 systemd-logind[1445]: Removed session 8. Dec 13 14:07:22.430359 systemd[1]: Started sshd@6-10.200.20.4:22-10.200.16.10:43380.service. Dec 13 14:07:22.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.16.10:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:22.847000 audit[1845]: USER_ACCT pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.848491 sshd[1845]: Accepted publickey for core from 10.200.16.10 port 43380 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:22.849000 audit[1845]: CRED_ACQ pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.849000 audit[1845]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd15a7880 a2=3 a3=1 items=0 ppid=1 pid=1845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:22.849000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:07:22.850325 sshd[1845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:22.854240 systemd-logind[1445]: New session 9 of user core. Dec 13 14:07:22.854792 systemd[1]: Started session-9.scope. Dec 13 14:07:22.858000 audit[1845]: USER_START pid=1845 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:22.859000 audit[1847]: CRED_ACQ pid=1847 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:23.087000 audit[1848]: USER_ACCT pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:23.088520 sudo[1848]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:07:23.087000 audit[1848]: CRED_REFR pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:23.088784 sudo[1848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:23.089000 audit[1848]: USER_START pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:23.112041 systemd[1]: Starting docker.service... Dec 13 14:07:23.157118 env[1858]: time="2024-12-13T14:07:23.157063770Z" level=info msg="Starting up" Dec 13 14:07:23.158692 env[1858]: time="2024-12-13T14:07:23.158658211Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:07:23.158861 env[1858]: time="2024-12-13T14:07:23.158846011Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:07:23.158931 env[1858]: time="2024-12-13T14:07:23.158914852Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:07:23.158985 env[1858]: time="2024-12-13T14:07:23.158973732Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:07:23.160934 env[1858]: time="2024-12-13T14:07:23.160891093Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:07:23.160934 env[1858]: time="2024-12-13T14:07:23.160928613Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:07:23.161052 env[1858]: time="2024-12-13T14:07:23.160949973Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:07:23.161052 env[1858]: time="2024-12-13T14:07:23.160960653Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:07:23.235630 env[1858]: time="2024-12-13T14:07:23.235584474Z" level=info msg="Loading containers: start." Dec 13 14:07:23.272000 audit[1886]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.272000 audit[1886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff67ff180 a2=0 a3=1 items=0 ppid=1858 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:07:23.274000 audit[1888]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.274000 audit[1888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc4d6bdd0 a2=0 a3=1 items=0 ppid=1858 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.274000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:07:23.276000 audit[1890]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.276000 audit[1890]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffec9c8660 a2=0 a3=1 items=0 ppid=1858 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.276000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:07:23.278000 audit[1892]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.278000 audit[1892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe3b8b490 a2=0 a3=1 items=0 ppid=1858 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.278000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:07:23.280000 audit[1894]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.280000 audit[1894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe29017a0 a2=0 a3=1 items=0 ppid=1858 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:07:23.282000 audit[1896]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.282000 audit[1896]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc5a75660 a2=0 a3=1 items=0 ppid=1858 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:07:23.298000 audit[1898]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.298000 audit[1898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffb5bc7b0 a2=0 a3=1 items=0 ppid=1858 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:07:23.300000 audit[1900]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.300000 audit[1900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff39dee10 a2=0 a3=1 items=0 ppid=1858 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:07:23.302000 audit[1902]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.302000 audit[1902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd2d712a0 a2=0 a3=1 items=0 ppid=1858 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:23.317000 audit[1906]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.317000 audit[1906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe62369b0 a2=0 a3=1 items=0 ppid=1858 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.317000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:23.328000 audit[1907]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.328000 audit[1907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc241d1b0 a2=0 a3=1 items=0 ppid=1858 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:23.347797 kernel: Initializing XFRM netlink socket Dec 13 14:07:23.362143 env[1858]: time="2024-12-13T14:07:23.362103337Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:07:23.398000 audit[1915]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.398000 audit[1915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe4010de0 a2=0 a3=1 items=0 ppid=1858 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:07:23.411000 audit[1918]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.411000 audit[1918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe178d220 a2=0 a3=1 items=0 ppid=1858 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:07:23.414000 audit[1921]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.414000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd176d790 a2=0 a3=1 items=0 ppid=1858 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.414000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:07:23.417000 audit[1923]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.417000 audit[1923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffed4222b0 a2=0 a3=1 items=0 ppid=1858 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.417000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:07:23.419000 audit[1925]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.419000 audit[1925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc21438d0 a2=0 a3=1 items=0 ppid=1858 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.419000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:07:23.421000 audit[1927]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.421000 audit[1927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcef3cfa0 a2=0 a3=1 items=0 ppid=1858 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:07:23.423000 audit[1929]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.423000 audit[1929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd41c2050 a2=0 a3=1 items=0 ppid=1858 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.423000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:07:23.426000 audit[1931]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.426000 audit[1931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffeb064e10 a2=0 a3=1 items=0 ppid=1858 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:07:23.428000 audit[1933]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.428000 audit[1933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc0747690 a2=0 a3=1 items=0 ppid=1858 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.428000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:07:23.430000 audit[1935]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.430000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffffb66df70 a2=0 a3=1 items=0 ppid=1858 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.430000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:07:23.432000 audit[1937]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.432000 audit[1937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffb066ca0 a2=0 a3=1 items=0 ppid=1858 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:07:23.434481 systemd-networkd[1616]: docker0: Link UP Dec 13 14:07:23.449000 audit[1941]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.449000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd821ae20 a2=0 a3=1 items=0 ppid=1858 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:23.458000 audit[1942]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:23.458000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc88823f0 a2=0 a3=1 items=0 ppid=1858 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:23.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:23.459440 env[1858]: time="2024-12-13T14:07:23.459410528Z" level=info msg="Loading containers: done." Dec 13 14:07:23.476531 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2978558940-merged.mount: Deactivated successfully. Dec 13 14:07:23.506219 env[1858]: time="2024-12-13T14:07:23.506153337Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:07:23.506615 env[1858]: time="2024-12-13T14:07:23.506592931Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:07:23.506842 env[1858]: time="2024-12-13T14:07:23.506823568Z" level=info msg="Daemon has completed initialization" Dec 13 14:07:23.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:23.534950 systemd[1]: Started docker.service. Dec 13 14:07:23.543157 env[1858]: time="2024-12-13T14:07:23.543075638Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:07:27.895978 env[1458]: time="2024-12-13T14:07:27.895935662Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:07:28.710983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1975307052.mount: Deactivated successfully. Dec 13 14:07:30.926530 env[1458]: time="2024-12-13T14:07:30.926464206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.931656 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 14:07:30.931852 systemd[1]: Stopped kubelet.service. Dec 13 14:07:30.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:30.933330 systemd[1]: Starting kubelet.service... Dec 13 14:07:30.934838 env[1458]: time="2024-12-13T14:07:30.934804896Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:50c86b7f73fdd28bacd4abf45260c9d3abc3b57eb038fa61fc45b5d0f2763e6f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.938097 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:07:30.938184 kernel: audit: type=1130 audit(1734098850.930:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:30.943012 env[1458]: time="2024-12-13T14:07:30.942975685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.946920 env[1458]: time="2024-12-13T14:07:30.946886059Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.947826 env[1458]: time="2024-12-13T14:07:30.947785161Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:50c86b7f73fdd28bacd4abf45260c9d3abc3b57eb038fa61fc45b5d0f2763e6f\"" Dec 13 14:07:30.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:30.972864 kernel: audit: type=1131 audit(1734098850.930:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:30.984322 env[1458]: time="2024-12-13T14:07:30.984222627Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:07:31.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:31.037688 systemd[1]: Started kubelet.service. Dec 13 14:07:31.057745 kernel: audit: type=1130 audit(1734098851.036:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:31.089563 kubelet[1990]: E1213 14:07:31.089497 1990 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:31.091437 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:31.091568 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:31.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:31.110744 kernel: audit: type=1131 audit(1734098851.090:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:33.349940 env[1458]: time="2024-12-13T14:07:33.349745252Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.355558 env[1458]: time="2024-12-13T14:07:33.355514472Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d47abaa6ccc533f84ef74fff6d509de10bb040317351b45afe95a8021a1ddf7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.360834 env[1458]: time="2024-12-13T14:07:33.360794702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.365621 env[1458]: time="2024-12-13T14:07:33.365568782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.366339 env[1458]: time="2024-12-13T14:07:33.366311748Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:2d47abaa6ccc533f84ef74fff6d509de10bb040317351b45afe95a8021a1ddf7\"" Dec 13 14:07:33.384482 env[1458]: time="2024-12-13T14:07:33.384448566Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:07:35.317980 env[1458]: time="2024-12-13T14:07:35.317920277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:35.322829 env[1458]: time="2024-12-13T14:07:35.322785135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ae633c52a23907b58f7a7867d2cccf3d3f5ebd8977beb6788e20fbecd3f446db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:35.326551 env[1458]: time="2024-12-13T14:07:35.326511900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:35.330079 env[1458]: time="2024-12-13T14:07:35.330041924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:35.330745 env[1458]: time="2024-12-13T14:07:35.330695702Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:ae633c52a23907b58f7a7867d2cccf3d3f5ebd8977beb6788e20fbecd3f446db\"" Dec 13 14:07:35.340409 env[1458]: time="2024-12-13T14:07:35.340373861Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:07:36.433592 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2955083342.mount: Deactivated successfully. Dec 13 14:07:36.879024 env[1458]: time="2024-12-13T14:07:36.878904731Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.884026 env[1458]: time="2024-12-13T14:07:36.883983781Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.887604 env[1458]: time="2024-12-13T14:07:36.887570488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.890094 env[1458]: time="2024-12-13T14:07:36.890065777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.890497 env[1458]: time="2024-12-13T14:07:36.890470260Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 14:07:36.899370 env[1458]: time="2024-12-13T14:07:36.899309921Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:07:37.559420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2197370795.mount: Deactivated successfully. Dec 13 14:07:39.250491 env[1458]: time="2024-12-13T14:07:39.250442831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.258304 env[1458]: time="2024-12-13T14:07:39.258263563Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.262773 env[1458]: time="2024-12-13T14:07:39.262747019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.267314 env[1458]: time="2024-12-13T14:07:39.267261353Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.268257 env[1458]: time="2024-12-13T14:07:39.268223031Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:07:39.277669 env[1458]: time="2024-12-13T14:07:39.277627027Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:07:39.928918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1967439941.mount: Deactivated successfully. Dec 13 14:07:39.950260 env[1458]: time="2024-12-13T14:07:39.950205998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.957164 env[1458]: time="2024-12-13T14:07:39.957122647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.960152 env[1458]: time="2024-12-13T14:07:39.960125350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.964444 env[1458]: time="2024-12-13T14:07:39.964420303Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:39.964873 env[1458]: time="2024-12-13T14:07:39.964843667Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Dec 13 14:07:39.973964 env[1458]: time="2024-12-13T14:07:39.973927010Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:07:40.669169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount124422297.mount: Deactivated successfully. Dec 13 14:07:41.181685 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Dec 13 14:07:41.181875 systemd[1]: Stopped kubelet.service. Dec 13 14:07:41.183277 systemd[1]: Starting kubelet.service... Dec 13 14:07:41.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.221293 kernel: audit: type=1130 audit(1734098861.180:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.221420 kernel: audit: type=1131 audit(1734098861.180:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.337114 systemd[1]: Started kubelet.service. Dec 13 14:07:41.355758 kernel: audit: type=1130 audit(1734098861.335:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.384263 kubelet[2025]: E1213 14:07:41.384217 2025 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:41.386120 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:41.386249 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:41.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:41.404741 kernel: audit: type=1131 audit(1734098861.384:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:44.164172 env[1458]: time="2024-12-13T14:07:44.164124058Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:44.170155 env[1458]: time="2024-12-13T14:07:44.170113848Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:44.173941 env[1458]: time="2024-12-13T14:07:44.173912403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:44.178230 env[1458]: time="2024-12-13T14:07:44.178192082Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:44.179084 env[1458]: time="2024-12-13T14:07:44.179057497Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Dec 13 14:07:50.212082 systemd[1]: Stopped kubelet.service. Dec 13 14:07:50.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:50.230887 systemd[1]: Starting kubelet.service... Dec 13 14:07:50.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:50.251974 kernel: audit: type=1130 audit(1734098870.211:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:50.252068 kernel: audit: type=1131 audit(1734098870.211:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:50.263949 systemd[1]: Reloading. Dec 13 14:07:50.330341 /usr/lib/systemd/system-generators/torcx-generator[2116]: time="2024-12-13T14:07:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:07:50.330693 /usr/lib/systemd/system-generators/torcx-generator[2116]: time="2024-12-13T14:07:50Z" level=info msg="torcx already run" Dec 13 14:07:50.407121 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:07:50.407138 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:07:50.422219 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:07:50.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523174 kernel: audit: type=1400 audit(1734098870.487:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523255 kernel: audit: type=1400 audit(1734098870.487:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.538871 kernel: audit: type=1400 audit(1734098870.487:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.538964 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:07:50.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.559603 kernel: audit: type=1400 audit(1734098870.487:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.559703 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:07:50.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.581408 kernel: audit: type=1400 audit(1734098870.488:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.581520 kernel: audit: backlog limit exceeded Dec 13 14:07:50.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.504000 audit: BPF prog-id=41 op=LOAD Dec 13 14:07:50.504000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit: BPF prog-id=42 op=LOAD Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit: BPF prog-id=43 op=LOAD Dec 13 14:07:50.505000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:07:50.505000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.505000 audit: BPF prog-id=44 op=LOAD Dec 13 14:07:50.505000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.522000 audit: BPF prog-id=45 op=LOAD Dec 13 14:07:50.522000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit: BPF prog-id=47 op=LOAD Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit: BPF prog-id=48 op=LOAD Dec 13 14:07:50.584000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:07:50.584000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit: BPF prog-id=49 op=LOAD Dec 13 14:07:50.585000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit: BPF prog-id=50 op=LOAD Dec 13 14:07:50.585000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit: BPF prog-id=51 op=LOAD Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.585000 audit: BPF prog-id=52 op=LOAD Dec 13 14:07:50.585000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:07:50.585000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:07:50.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit: BPF prog-id=53 op=LOAD Dec 13 14:07:50.587000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit: BPF prog-id=54 op=LOAD Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:50.587000 audit: BPF prog-id=55 op=LOAD Dec 13 14:07:50.587000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:07:50.587000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:07:50.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:50.793090 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:07:50.793201 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:07:50.793595 systemd[1]: Stopped kubelet.service. Dec 13 14:07:50.796837 systemd[1]: Starting kubelet.service... Dec 13 14:07:50.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:50.927343 systemd[1]: Started kubelet.service. Dec 13 14:07:50.974180 kubelet[2179]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:50.974180 kubelet[2179]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:07:50.974180 kubelet[2179]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:50.974538 kubelet[2179]: I1213 14:07:50.974221 2179 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:07:52.100922 kubelet[2179]: I1213 14:07:52.100890 2179 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:07:52.101259 kubelet[2179]: I1213 14:07:52.101245 2179 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:07:52.101521 kubelet[2179]: I1213 14:07:52.101507 2179 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:07:52.115445 kubelet[2179]: E1213 14:07:52.115418 2179 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.115613 kubelet[2179]: I1213 14:07:52.115576 2179 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:07:52.124370 kubelet[2179]: I1213 14:07:52.124344 2179 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:07:52.125660 kubelet[2179]: I1213 14:07:52.125634 2179 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:07:52.125864 kubelet[2179]: I1213 14:07:52.125841 2179 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:07:52.125951 kubelet[2179]: I1213 14:07:52.125870 2179 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:07:52.125951 kubelet[2179]: I1213 14:07:52.125879 2179 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:07:52.126002 kubelet[2179]: I1213 14:07:52.125986 2179 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:52.128428 kubelet[2179]: I1213 14:07:52.128406 2179 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:07:52.128489 kubelet[2179]: I1213 14:07:52.128435 2179 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:07:52.128489 kubelet[2179]: I1213 14:07:52.128458 2179 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:07:52.128489 kubelet[2179]: I1213 14:07:52.128471 2179 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:07:52.131130 kubelet[2179]: W1213 14:07:52.131070 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.131200 kubelet[2179]: E1213 14:07:52.131143 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.131241 kubelet[2179]: W1213 14:07:52.131207 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-52bcbbb462&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.131269 kubelet[2179]: E1213 14:07:52.131240 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-52bcbbb462&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.131356 kubelet[2179]: I1213 14:07:52.131331 2179 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:07:52.131649 kubelet[2179]: I1213 14:07:52.131619 2179 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:07:52.131698 kubelet[2179]: W1213 14:07:52.131675 2179 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:07:52.133087 kubelet[2179]: I1213 14:07:52.133058 2179 server.go:1256] "Started kubelet" Dec 13 14:07:52.137000 audit[2179]: AVC avc: denied { mac_admin } for pid=2179 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:52.137000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:52.137000 audit[2179]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bf31d0 a1=4000cb6588 a2=4000bf31a0 a3=25 items=0 ppid=1 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:52.137000 audit[2179]: AVC avc: denied { mac_admin } for pid=2179 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:52.137000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:52.137000 audit[2179]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009a1b80 a1=4000cb65a0 a2=4000bf3260 a3=25 items=0 ppid=1 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:52.138599 kubelet[2179]: I1213 14:07:52.138207 2179 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:07:52.138599 kubelet[2179]: I1213 14:07:52.138240 2179 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:07:52.138861 kubelet[2179]: I1213 14:07:52.138838 2179 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:07:52.140804 kubelet[2179]: I1213 14:07:52.140777 2179 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:07:52.141105 kubelet[2179]: I1213 14:07:52.141086 2179 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:07:52.142662 kubelet[2179]: I1213 14:07:52.142612 2179 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:07:52.143107 kubelet[2179]: I1213 14:07:52.143080 2179 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:07:52.143167 kubelet[2179]: I1213 14:07:52.143153 2179 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:07:52.144389 kubelet[2179]: E1213 14:07:52.144369 2179 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.4:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.4:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-52bcbbb462.1810c1bc8ee527be default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-52bcbbb462,UID:ci-3510.3.6-a-52bcbbb462,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-52bcbbb462,},FirstTimestamp:2024-12-13 14:07:52.133035966 +0000 UTC m=+1.202058820,LastTimestamp:2024-12-13 14:07:52.133035966 +0000 UTC m=+1.202058820,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-52bcbbb462,}" Dec 13 14:07:52.145167 kubelet[2179]: W1213 14:07:52.145112 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.145311 kubelet[2179]: E1213 14:07:52.145297 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.145470 kubelet[2179]: E1213 14:07:52.145457 2179 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-52bcbbb462?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="200ms" Dec 13 14:07:52.146074 kubelet[2179]: I1213 14:07:52.146042 2179 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:07:52.146280 kubelet[2179]: I1213 14:07:52.146264 2179 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:07:52.146000 audit[2189]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.146000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffcefd250 a2=0 a3=1 items=0 ppid=2179 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:07:52.148506 kubelet[2179]: I1213 14:07:52.148491 2179 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:07:52.148000 audit[2190]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.148000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3b67ec0 a2=0 a3=1 items=0 ppid=2179 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:07:52.151528 kubelet[2179]: I1213 14:07:52.151489 2179 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:07:52.152261 kubelet[2179]: I1213 14:07:52.152234 2179 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:07:52.154000 audit[2192]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.154000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffefcedca0 a2=0 a3=1 items=0 ppid=2179 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:52.156000 audit[2194]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.156000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffefafd180 a2=0 a3=1 items=0 ppid=2179 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:52.165984 kubelet[2179]: E1213 14:07:52.165956 2179 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:07:52.176000 audit[2200]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.176000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd63acf90 a2=0 a3=1 items=0 ppid=2179 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:07:52.177613 kubelet[2179]: I1213 14:07:52.177593 2179 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:07:52.177000 audit[2202]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:52.177000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe2adccc0 a2=0 a3=1 items=0 ppid=2179 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:07:52.178764 kubelet[2179]: I1213 14:07:52.178741 2179 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:07:52.178764 kubelet[2179]: I1213 14:07:52.178765 2179 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:07:52.178824 kubelet[2179]: I1213 14:07:52.178783 2179 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:07:52.178848 kubelet[2179]: E1213 14:07:52.178826 2179 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:07:52.178000 audit[2203]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.178000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec23ae90 a2=0 a3=1 items=0 ppid=2179 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:07:52.179905 kubelet[2179]: W1213 14:07:52.179854 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.180000 kubelet[2179]: E1213 14:07:52.179911 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:52.180000 audit[2207]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.180000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9659d50 a2=0 a3=1 items=0 ppid=2179 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:07:52.180000 audit[2206]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:52.180000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7a71780 a2=0 a3=1 items=0 ppid=2179 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:07:52.181000 audit[2208]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:52.181000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc282c5f0 a2=0 a3=1 items=0 ppid=2179 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:07:52.182000 audit[2209]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:52.182000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffce815e10 a2=0 a3=1 items=0 ppid=2179 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:07:52.183000 audit[2210]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:52.183000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde133280 a2=0 a3=1 items=0 ppid=2179 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:07:52.277439 kubelet[2179]: I1213 14:07:52.277410 2179 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.278234 kubelet[2179]: I1213 14:07:52.278210 2179 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:07:52.278234 kubelet[2179]: I1213 14:07:52.278228 2179 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:07:52.278347 kubelet[2179]: I1213 14:07:52.278251 2179 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:52.278589 kubelet[2179]: E1213 14:07:52.278569 2179 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.279945 kubelet[2179]: E1213 14:07:52.279868 2179 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:07:52.284891 kubelet[2179]: I1213 14:07:52.284872 2179 policy_none.go:49] "None policy: Start" Dec 13 14:07:52.285552 kubelet[2179]: I1213 14:07:52.285530 2179 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:07:52.285634 kubelet[2179]: I1213 14:07:52.285575 2179 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:07:52.294559 systemd[1]: Created slice kubepods.slice. Dec 13 14:07:52.299276 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:07:52.302134 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:07:52.310523 kubelet[2179]: I1213 14:07:52.310498 2179 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:07:52.309000 audit[2179]: AVC avc: denied { mac_admin } for pid=2179 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:52.309000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:52.309000 audit[2179]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f8c7e0 a1=4000e7d848 a2=4000f8c7b0 a3=25 items=0 ppid=1 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:52.309000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:52.311028 kubelet[2179]: I1213 14:07:52.311016 2179 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:07:52.311432 kubelet[2179]: I1213 14:07:52.311417 2179 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:07:52.313619 kubelet[2179]: E1213 14:07:52.313604 2179 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:07:52.346039 kubelet[2179]: E1213 14:07:52.346011 2179 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-52bcbbb462?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="400ms" Dec 13 14:07:52.480144 kubelet[2179]: I1213 14:07:52.480112 2179 topology_manager.go:215] "Topology Admit Handler" podUID="12ed49a8ecde5cffdff8240bd9c2de69" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.481113 kubelet[2179]: I1213 14:07:52.481042 2179 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.481860 kubelet[2179]: E1213 14:07:52.481845 2179 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.482184 kubelet[2179]: I1213 14:07:52.482168 2179 topology_manager.go:215] "Topology Admit Handler" podUID="2591dd3fe987c852eceb7ac55dd7758c" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.483660 kubelet[2179]: I1213 14:07:52.483630 2179 topology_manager.go:215] "Topology Admit Handler" podUID="385ee58521fc27a9cfcbff8822f372d0" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.488055 systemd[1]: Created slice kubepods-burstable-pod12ed49a8ecde5cffdff8240bd9c2de69.slice. Dec 13 14:07:52.504574 systemd[1]: Created slice kubepods-burstable-pod2591dd3fe987c852eceb7ac55dd7758c.slice. Dec 13 14:07:52.514576 systemd[1]: Created slice kubepods-burstable-pod385ee58521fc27a9cfcbff8822f372d0.slice. Dec 13 14:07:52.545356 kubelet[2179]: I1213 14:07:52.545325 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.545550 kubelet[2179]: I1213 14:07:52.545536 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.545639 kubelet[2179]: I1213 14:07:52.545628 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.545755 kubelet[2179]: I1213 14:07:52.545744 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2591dd3fe987c852eceb7ac55dd7758c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-52bcbbb462\" (UID: \"2591dd3fe987c852eceb7ac55dd7758c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.545862 kubelet[2179]: I1213 14:07:52.545850 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2591dd3fe987c852eceb7ac55dd7758c-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-52bcbbb462\" (UID: \"2591dd3fe987c852eceb7ac55dd7758c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.545943 kubelet[2179]: I1213 14:07:52.545934 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2591dd3fe987c852eceb7ac55dd7758c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-52bcbbb462\" (UID: \"2591dd3fe987c852eceb7ac55dd7758c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.546028 kubelet[2179]: I1213 14:07:52.546018 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.546117 kubelet[2179]: I1213 14:07:52.546107 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.546202 kubelet[2179]: I1213 14:07:52.546191 2179 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/12ed49a8ecde5cffdff8240bd9c2de69-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-52bcbbb462\" (UID: \"12ed49a8ecde5cffdff8240bd9c2de69\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.747562 kubelet[2179]: E1213 14:07:52.746781 2179 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-52bcbbb462?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="800ms" Dec 13 14:07:52.802558 env[1458]: time="2024-12-13T14:07:52.802514477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-52bcbbb462,Uid:12ed49a8ecde5cffdff8240bd9c2de69,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:52.807215 env[1458]: time="2024-12-13T14:07:52.807115195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-52bcbbb462,Uid:2591dd3fe987c852eceb7ac55dd7758c,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:52.817163 env[1458]: time="2024-12-13T14:07:52.817122740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-52bcbbb462,Uid:385ee58521fc27a9cfcbff8822f372d0,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:52.884090 kubelet[2179]: I1213 14:07:52.884058 2179 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:52.884414 kubelet[2179]: E1213 14:07:52.884400 2179 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:53.295213 kubelet[2179]: W1213 14:07:53.295136 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.295213 kubelet[2179]: E1213 14:07:53.295172 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.342941 kubelet[2179]: W1213 14:07:53.342881 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.342941 kubelet[2179]: E1213 14:07:53.342916 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.447055 kubelet[2179]: W1213 14:07:53.446990 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.447055 kubelet[2179]: E1213 14:07:53.447059 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.539811 kubelet[2179]: W1213 14:07:53.539773 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-52bcbbb462&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.539811 kubelet[2179]: E1213 14:07:53.539813 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-52bcbbb462&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:53.547854 kubelet[2179]: E1213 14:07:53.547346 2179 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-52bcbbb462?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="1.6s" Dec 13 14:07:53.686710 kubelet[2179]: I1213 14:07:53.686361 2179 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:53.686710 kubelet[2179]: E1213 14:07:53.686693 2179 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:54.311441 kubelet[2179]: E1213 14:07:54.311405 2179 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:54.713491 kubelet[2179]: E1213 14:07:54.713455 2179 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.4:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.4:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-52bcbbb462.1810c1bc8ee527be default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-52bcbbb462,UID:ci-3510.3.6-a-52bcbbb462,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-52bcbbb462,},FirstTimestamp:2024-12-13 14:07:52.133035966 +0000 UTC m=+1.202058820,LastTimestamp:2024-12-13 14:07:52.133035966 +0000 UTC m=+1.202058820,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-52bcbbb462,}" Dec 13 14:07:55.148182 kubelet[2179]: E1213 14:07:55.147859 2179 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-52bcbbb462?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="3.2s" Dec 13 14:07:55.194609 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount750777286.mount: Deactivated successfully. Dec 13 14:07:55.288897 kubelet[2179]: I1213 14:07:55.288859 2179 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:55.289233 kubelet[2179]: E1213 14:07:55.289212 2179 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:55.484800 env[1458]: time="2024-12-13T14:07:55.484758971Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.594638 kubelet[2179]: W1213 14:07:55.594594 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:55.594638 kubelet[2179]: E1213 14:07:55.594640 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:55.688484 env[1458]: time="2024-12-13T14:07:55.688404932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.692511 env[1458]: time="2024-12-13T14:07:55.692466299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.787955 env[1458]: time="2024-12-13T14:07:55.787528986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.890054 env[1458]: time="2024-12-13T14:07:55.890015369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.940362 env[1458]: time="2024-12-13T14:07:55.940322254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.943142 env[1458]: time="2024-12-13T14:07:55.943110054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:55.985999 kubelet[2179]: W1213 14:07:55.985963 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:55.985999 kubelet[2179]: E1213 14:07:55.986002 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:55.988517 env[1458]: time="2024-12-13T14:07:55.988484661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:56.082405 env[1458]: time="2024-12-13T14:07:56.081902870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:56.142049 env[1458]: time="2024-12-13T14:07:56.141997116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:56.237453 env[1458]: time="2024-12-13T14:07:56.237413470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:56.286109 env[1458]: time="2024-12-13T14:07:56.286068314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:56.335583 kubelet[2179]: W1213 14:07:56.335185 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-52bcbbb462&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:56.335583 kubelet[2179]: E1213 14:07:56.335232 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-52bcbbb462&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:56.499501 kubelet[2179]: W1213 14:07:56.499460 2179 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:56.499645 kubelet[2179]: E1213 14:07:56.499514 2179 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Dec 13 14:07:56.644499 env[1458]: time="2024-12-13T14:07:56.643948419Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:56.644499 env[1458]: time="2024-12-13T14:07:56.643985617Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:56.644499 env[1458]: time="2024-12-13T14:07:56.643995177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:56.644499 env[1458]: time="2024-12-13T14:07:56.644305119Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c25e3341449fa125ad8ededbd1a624dde75f62fca483713f51cd9b6ae8bd75bb pid=2219 runtime=io.containerd.runc.v2 Dec 13 14:07:56.659825 systemd[1]: Started cri-containerd-c25e3341449fa125ad8ededbd1a624dde75f62fca483713f51cd9b6ae8bd75bb.scope. Dec 13 14:07:56.663113 systemd[1]: run-containerd-runc-k8s.io-c25e3341449fa125ad8ededbd1a624dde75f62fca483713f51cd9b6ae8bd75bb-runc.p2HXGj.mount: Deactivated successfully. Dec 13 14:07:56.704431 kernel: kauditd_printk_skb: 216 callbacks suppressed Dec 13 14:07:56.704580 kernel: audit: type=1400 audit(1734098876.679:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.722253 kernel: audit: type=1400 audit(1734098876.679:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.741203 kernel: audit: type=1400 audit(1734098876.679:454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.759864 kernel: audit: type=1400 audit(1734098876.679:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.777744 kernel: audit: type=1400 audit(1734098876.679:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.795823 kernel: audit: type=1400 audit(1734098876.679:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.812156 env[1458]: time="2024-12-13T14:07:56.796100527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-52bcbbb462,Uid:12ed49a8ecde5cffdff8240bd9c2de69,Namespace:kube-system,Attempt:0,} returns sandbox id \"c25e3341449fa125ad8ededbd1a624dde75f62fca483713f51cd9b6ae8bd75bb\"" Dec 13 14:07:56.812156 env[1458]: time="2024-12-13T14:07:56.799299668Z" level=info msg="CreateContainer within sandbox \"c25e3341449fa125ad8ededbd1a624dde75f62fca483713f51cd9b6ae8bd75bb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.812804 kernel: audit: type=1400 audit(1734098876.679:458): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.845448 kernel: audit: type=1400 audit(1734098876.679:459): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.845572 kernel: audit: type=1400 audit(1734098876.679:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.845605 kernel: audit: type=1400 audit(1734098876.679:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.679000 audit: BPF prog-id=56 op=LOAD Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2219 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332356533333431343439666131323561643865646564626431613632 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2219 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332356533333431343439666131323561643865646564626431613632 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.685000 audit: BPF prog-id=57 op=LOAD Dec 13 14:07:56.685000 audit[2229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2219 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332356533333431343439666131323561643865646564626431613632 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit: BPF prog-id=58 op=LOAD Dec 13 14:07:56.703000 audit[2229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2219 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332356533333431343439666131323561643865646564626431613632 Dec 13 14:07:56.703000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:07:56.703000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.703000 audit: BPF prog-id=59 op=LOAD Dec 13 14:07:56.703000 audit[2229]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2219 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332356533333431343439666131323561643865646564626431613632 Dec 13 14:07:56.876528 env[1458]: time="2024-12-13T14:07:56.876446442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:56.876528 env[1458]: time="2024-12-13T14:07:56.876488960Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:56.876773 env[1458]: time="2024-12-13T14:07:56.876706948Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:56.877801 env[1458]: time="2024-12-13T14:07:56.877041129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbd58ddb262654f85728f4a1aaa1022de517b908765d91c8cb2fdbbfab158b52 pid=2261 runtime=io.containerd.runc.v2 Dec 13 14:07:56.888264 systemd[1]: Started cri-containerd-cbd58ddb262654f85728f4a1aaa1022de517b908765d91c8cb2fdbbfab158b52.scope. Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit: BPF prog-id=60 op=LOAD Dec 13 14:07:56.900000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.900000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2261 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643538646462323632363534663835373238663461316161613130 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2261 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643538646462323632363534663835373238663461316161613130 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit: BPF prog-id=61 op=LOAD Dec 13 14:07:56.902000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2261 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643538646462323632363534663835373238663461316161613130 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.902000 audit: BPF prog-id=62 op=LOAD Dec 13 14:07:56.902000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2261 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643538646462323632363534663835373238663461316161613130 Dec 13 14:07:56.903000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:07:56.903000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.903000 audit: BPF prog-id=63 op=LOAD Dec 13 14:07:56.903000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2261 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362643538646462323632363534663835373238663461316161613130 Dec 13 14:07:56.923314 env[1458]: time="2024-12-13T14:07:56.923262589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-52bcbbb462,Uid:385ee58521fc27a9cfcbff8822f372d0,Namespace:kube-system,Attempt:0,} returns sandbox id \"cbd58ddb262654f85728f4a1aaa1022de517b908765d91c8cb2fdbbfab158b52\"" Dec 13 14:07:56.926468 env[1458]: time="2024-12-13T14:07:56.926436572Z" level=info msg="CreateContainer within sandbox \"cbd58ddb262654f85728f4a1aaa1022de517b908765d91c8cb2fdbbfab158b52\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:07:57.001781 env[1458]: time="2024-12-13T14:07:57.001653094Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:57.001781 env[1458]: time="2024-12-13T14:07:57.001693012Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:57.001781 env[1458]: time="2024-12-13T14:07:57.001703371Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:57.002236 env[1458]: time="2024-12-13T14:07:57.002174266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f801456d07b9b7fe567653d09755682ccc18b8bff4686cdc1eac49529fc9b527 pid=2305 runtime=io.containerd.runc.v2 Dec 13 14:07:57.012322 systemd[1]: Started cri-containerd-f801456d07b9b7fe567653d09755682ccc18b8bff4686cdc1eac49529fc9b527.scope. Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.023000 audit: BPF prog-id=64 op=LOAD Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2305 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303134353664303762396237666535363736353364303937353536 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2305 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303134353664303762396237666535363736353364303937353536 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.024000 audit: BPF prog-id=65 op=LOAD Dec 13 14:07:57.024000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2305 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303134353664303762396237666535363736353364303937353536 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.025000 audit: BPF prog-id=66 op=LOAD Dec 13 14:07:57.025000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2305 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303134353664303762396237666535363736353364303937353536 Dec 13 14:07:57.026000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:07:57.026000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.026000 audit: BPF prog-id=67 op=LOAD Dec 13 14:07:57.026000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2305 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638303134353664303762396237666535363736353364303937353536 Dec 13 14:07:57.058211 env[1458]: time="2024-12-13T14:07:57.058167733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-52bcbbb462,Uid:2591dd3fe987c852eceb7ac55dd7758c,Namespace:kube-system,Attempt:0,} returns sandbox id \"f801456d07b9b7fe567653d09755682ccc18b8bff4686cdc1eac49529fc9b527\"" Dec 13 14:07:57.061288 env[1458]: time="2024-12-13T14:07:57.061243725Z" level=info msg="CreateContainer within sandbox \"f801456d07b9b7fe567653d09755682ccc18b8bff4686cdc1eac49529fc9b527\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:07:57.483605 env[1458]: time="2024-12-13T14:07:57.483538102Z" level=info msg="CreateContainer within sandbox \"c25e3341449fa125ad8ededbd1a624dde75f62fca483713f51cd9b6ae8bd75bb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"df7cd48208b9ac87885fd7db84d603758f76329cc009de4eb4ad85c7574689ee\"" Dec 13 14:07:57.484561 env[1458]: time="2024-12-13T14:07:57.484519209Z" level=info msg="StartContainer for \"df7cd48208b9ac87885fd7db84d603758f76329cc009de4eb4ad85c7574689ee\"" Dec 13 14:07:57.499620 systemd[1]: Started cri-containerd-df7cd48208b9ac87885fd7db84d603758f76329cc009de4eb4ad85c7574689ee.scope. Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.511000 audit: BPF prog-id=68 op=LOAD Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376364343832303862396163383738383566643764623834643630 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376364343832303862396163383738383566643764623834643630 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit: BPF prog-id=69 op=LOAD Dec 13 14:07:57.512000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376364343832303862396163383738383566643764623834643630 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit: BPF prog-id=70 op=LOAD Dec 13 14:07:57.512000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376364343832303862396163383738383566643764623834643630 Dec 13 14:07:57.512000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:07:57.512000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.512000 audit: BPF prog-id=71 op=LOAD Dec 13 14:07:57.512000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2219 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376364343832303862396163383738383566643764623834643630 Dec 13 14:07:57.592530 env[1458]: time="2024-12-13T14:07:57.592473484Z" level=info msg="StartContainer for \"df7cd48208b9ac87885fd7db84d603758f76329cc009de4eb4ad85c7574689ee\" returns successfully" Dec 13 14:07:57.595147 env[1458]: time="2024-12-13T14:07:57.595100860Z" level=info msg="CreateContainer within sandbox \"cbd58ddb262654f85728f4a1aaa1022de517b908765d91c8cb2fdbbfab158b52\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f6577eb7583a33a34734aa4c3e9065265ee2ce72d32fa940b04ababc1cffad73\"" Dec 13 14:07:57.595619 env[1458]: time="2024-12-13T14:07:57.595593273Z" level=info msg="StartContainer for \"f6577eb7583a33a34734aa4c3e9065265ee2ce72d32fa940b04ababc1cffad73\"" Dec 13 14:07:57.611200 systemd[1]: Started cri-containerd-f6577eb7583a33a34734aa4c3e9065265ee2ce72d32fa940b04ababc1cffad73.scope. Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.627000 audit: BPF prog-id=72 op=LOAD Dec 13 14:07:57.628000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.628000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2261 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636353737656237353833613333613334373334616134633365393036 Dec 13 14:07:57.628000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.628000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2261 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636353737656237353833613333613334373334616134633365393036 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit: BPF prog-id=73 op=LOAD Dec 13 14:07:57.630000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2261 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636353737656237353833613333613334373334616134633365393036 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.630000 audit: BPF prog-id=74 op=LOAD Dec 13 14:07:57.630000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2261 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636353737656237353833613333613334373334616134633365393036 Dec 13 14:07:57.631000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:07:57.631000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.631000 audit: BPF prog-id=75 op=LOAD Dec 13 14:07:57.631000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2261 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636353737656237353833613333613334373334616134633365393036 Dec 13 14:07:57.645504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount766495240.mount: Deactivated successfully. Dec 13 14:07:57.649071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3890813930.mount: Deactivated successfully. Dec 13 14:07:57.690108 env[1458]: time="2024-12-13T14:07:57.690032725Z" level=info msg="StartContainer for \"f6577eb7583a33a34734aa4c3e9065265ee2ce72d32fa940b04ababc1cffad73\" returns successfully" Dec 13 14:07:57.785157 env[1458]: time="2024-12-13T14:07:57.785043425Z" level=info msg="CreateContainer within sandbox \"f801456d07b9b7fe567653d09755682ccc18b8bff4686cdc1eac49529fc9b527\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8e2b00733c05f3ea2b07188f34f9cb297b6427c36468dd1f7533fb7694aecc6c\"" Dec 13 14:07:57.787637 env[1458]: time="2024-12-13T14:07:57.787582367Z" level=info msg="StartContainer for \"8e2b00733c05f3ea2b07188f34f9cb297b6427c36468dd1f7533fb7694aecc6c\"" Dec 13 14:07:57.810323 systemd[1]: Started cri-containerd-8e2b00733c05f3ea2b07188f34f9cb297b6427c36468dd1f7533fb7694aecc6c.scope. Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.834000 audit: BPF prog-id=76 op=LOAD Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2305 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865326230303733336330356633656132623037313838663334663963 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2305 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865326230303733336330356633656132623037313838663334663963 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.835000 audit: BPF prog-id=77 op=LOAD Dec 13 14:07:57.835000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2305 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865326230303733336330356633656132623037313838663334663963 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.836000 audit: BPF prog-id=78 op=LOAD Dec 13 14:07:57.836000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2305 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865326230303733336330356633656132623037313838663334663963 Dec 13 14:07:57.837000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:07:57.837000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:57.837000 audit: BPF prog-id=79 op=LOAD Dec 13 14:07:57.837000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2305 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865326230303733336330356633656132623037313838663334663963 Dec 13 14:07:57.876002 env[1458]: time="2024-12-13T14:07:57.875953509Z" level=info msg="StartContainer for \"8e2b00733c05f3ea2b07188f34f9cb297b6427c36468dd1f7533fb7694aecc6c\" returns successfully" Dec 13 14:07:58.490824 kubelet[2179]: I1213 14:07:58.490797 2179 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:07:59.862000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.862000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bc05a0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:07:59.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:59.862000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.862000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40007b6a40 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:07:59.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:59.901000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.901000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005e68c90 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:07:59.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:07:59.901000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.901000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003f040c0 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:07:59.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:07:59.902000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.902000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4005e68db0 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:07:59.902000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:07:59.908000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.908000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=400609a630 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:07:59.908000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:07:59.918000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.918000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4004266400 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:07:59.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:07:59.919000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.919000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400340e330 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:07:59.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:08:00.078849 kubelet[2179]: E1213 14:08:00.078818 2179 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-52bcbbb462\" not found" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:00.091861 kubelet[2179]: I1213 14:08:00.091828 2179 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:00.126851 kubelet[2179]: E1213 14:08:00.126759 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.227192 kubelet[2179]: E1213 14:08:00.227156 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.327696 kubelet[2179]: E1213 14:08:00.327665 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.428211 kubelet[2179]: E1213 14:08:00.428109 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.528600 kubelet[2179]: E1213 14:08:00.528569 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.629169 kubelet[2179]: E1213 14:08:00.629130 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.729638 kubelet[2179]: E1213 14:08:00.729606 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.830155 kubelet[2179]: E1213 14:08:00.830116 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:00.930719 kubelet[2179]: E1213 14:08:00.930670 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.030891 kubelet[2179]: E1213 14:08:01.030781 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.131796 kubelet[2179]: E1213 14:08:01.131755 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.232615 kubelet[2179]: E1213 14:08:01.232575 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.333763 kubelet[2179]: E1213 14:08:01.333639 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.434154 kubelet[2179]: E1213 14:08:01.434091 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.534661 kubelet[2179]: E1213 14:08:01.534616 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.635377 kubelet[2179]: E1213 14:08:01.635271 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.735860 kubelet[2179]: E1213 14:08:01.735820 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.836387 kubelet[2179]: E1213 14:08:01.836356 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:01.937282 kubelet[2179]: E1213 14:08:01.937255 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.037771 kubelet[2179]: E1213 14:08:02.037728 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.138586 kubelet[2179]: E1213 14:08:02.138548 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.239105 kubelet[2179]: E1213 14:08:02.239006 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.313836 kubelet[2179]: E1213 14:08:02.313809 2179 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.340125 kubelet[2179]: E1213 14:08:02.340088 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.440515 kubelet[2179]: E1213 14:08:02.440483 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:02.541081 kubelet[2179]: E1213 14:08:02.540961 2179 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-52bcbbb462\" not found" Dec 13 14:08:03.134990 kubelet[2179]: I1213 14:08:03.134948 2179 apiserver.go:52] "Watching apiserver" Dec 13 14:08:03.143356 kubelet[2179]: I1213 14:08:03.143312 2179 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:08:03.260435 systemd[1]: Reloading. Dec 13 14:08:03.326950 /usr/lib/systemd/system-generators/torcx-generator[2475]: time="2024-12-13T14:08:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:08:03.327004 /usr/lib/systemd/system-generators/torcx-generator[2475]: time="2024-12-13T14:08:03Z" level=info msg="torcx already run" Dec 13 14:08:03.407848 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:08:03.407865 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:08:03.423908 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:08:03.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.504283 kernel: kauditd_printk_skb: 356 callbacks suppressed Dec 13 14:08:03.504385 kernel: audit: type=1400 audit(1734098883.498:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536868 kernel: audit: type=1400 audit(1734098883.508:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552896 kernel: audit: type=1400 audit(1734098883.508:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569702 kernel: audit: type=1400 audit(1734098883.508:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.586473 kernel: audit: type=1400 audit(1734098883.508:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.603419 kernel: audit: type=1400 audit(1734098883.508:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.603520 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.624492 kernel: audit: type=1400 audit(1734098883.508:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.624598 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645950 kernel: audit: type=1400 audit(1734098883.508:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit: BPF prog-id=80 op=LOAD Dec 13 14:08:03.520000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit: BPF prog-id=81 op=LOAD Dec 13 14:08:03.536000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit: BPF prog-id=82 op=LOAD Dec 13 14:08:03.552000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit: BPF prog-id=83 op=LOAD Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit: BPF prog-id=84 op=LOAD Dec 13 14:08:03.569000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:08:03.569000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.585000 audit: BPF prog-id=85 op=LOAD Dec 13 14:08:03.585000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:08:03.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.645000 audit: BPF prog-id=87 op=LOAD Dec 13 14:08:03.645000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.646000 audit: BPF prog-id=88 op=LOAD Dec 13 14:08:03.647000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit: BPF prog-id=89 op=LOAD Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit: BPF prog-id=90 op=LOAD Dec 13 14:08:03.647000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:08:03.647000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.647000 audit: BPF prog-id=91 op=LOAD Dec 13 14:08:03.647000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit: BPF prog-id=92 op=LOAD Dec 13 14:08:03.648000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit: BPF prog-id=93 op=LOAD Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit: BPF prog-id=94 op=LOAD Dec 13 14:08:03.648000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.648000 audit: BPF prog-id=95 op=LOAD Dec 13 14:08:03.648000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.649000 audit: BPF prog-id=96 op=LOAD Dec 13 14:08:03.649000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit: BPF prog-id=97 op=LOAD Dec 13 14:08:03.650000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit: BPF prog-id=98 op=LOAD Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.650000 audit: BPF prog-id=99 op=LOAD Dec 13 14:08:03.650000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:08:03.650000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.652000 audit: BPF prog-id=100 op=LOAD Dec 13 14:08:03.652000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:08:03.678274 kubelet[2179]: I1213 14:08:03.675609 2179 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:08:03.676508 systemd[1]: Stopping kubelet.service... Dec 13 14:08:03.697111 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:08:03.697297 systemd[1]: Stopped kubelet.service. Dec 13 14:08:03.697360 systemd[1]: kubelet.service: Consumed 1.502s CPU time. Dec 13 14:08:03.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:03.699084 systemd[1]: Starting kubelet.service... Dec 13 14:08:03.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:03.777679 systemd[1]: Started kubelet.service. Dec 13 14:08:03.829132 kubelet[2539]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:08:03.829132 kubelet[2539]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:08:03.829132 kubelet[2539]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:08:03.829888 kubelet[2539]: I1213 14:08:03.829830 2539 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:08:03.840574 kubelet[2539]: I1213 14:08:03.840539 2539 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:08:03.840752 kubelet[2539]: I1213 14:08:03.840739 2539 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:08:03.841076 kubelet[2539]: I1213 14:08:03.841056 2539 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:08:03.842762 kubelet[2539]: I1213 14:08:03.842706 2539 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:08:03.844629 kubelet[2539]: I1213 14:08:03.844592 2539 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:08:03.855155 kubelet[2539]: I1213 14:08:03.855125 2539 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:08:03.855334 kubelet[2539]: I1213 14:08:03.855317 2539 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:08:03.855504 kubelet[2539]: I1213 14:08:03.855483 2539 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:08:03.855504 kubelet[2539]: I1213 14:08:03.855503 2539 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:08:03.855606 kubelet[2539]: I1213 14:08:03.855512 2539 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:08:03.855606 kubelet[2539]: I1213 14:08:03.855540 2539 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:08:03.855669 kubelet[2539]: I1213 14:08:03.855634 2539 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:08:03.855669 kubelet[2539]: I1213 14:08:03.855648 2539 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:08:03.855669 kubelet[2539]: I1213 14:08:03.855668 2539 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:08:03.855758 kubelet[2539]: I1213 14:08:03.855681 2539 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:08:03.864000 audit[2539]: AVC avc: denied { mac_admin } for pid=2539 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.864000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:08:03.864000 audit[2539]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b68ff0 a1=4000c561b0 a2=4000b68fc0 a3=25 items=0 ppid=1 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.864000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:08:03.865000 audit[2539]: AVC avc: denied { mac_admin } for pid=2539 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.865000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:08:03.865000 audit[2539]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aece80 a1=4000c561c8 a2=4000b69080 a3=25 items=0 ppid=1 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:08:03.866904 kubelet[2539]: I1213 14:08:03.857523 2539 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:08:03.866904 kubelet[2539]: I1213 14:08:03.857817 2539 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:08:03.866904 kubelet[2539]: I1213 14:08:03.858282 2539 server.go:1256] "Started kubelet" Dec 13 14:08:03.866904 kubelet[2539]: I1213 14:08:03.866131 2539 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:08:03.866904 kubelet[2539]: I1213 14:08:03.866187 2539 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:08:03.866904 kubelet[2539]: I1213 14:08:03.866219 2539 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:08:03.870504 kubelet[2539]: I1213 14:08:03.870280 2539 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:08:03.873297 kubelet[2539]: I1213 14:08:03.873268 2539 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:08:03.875885 kubelet[2539]: I1213 14:08:03.875860 2539 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:08:03.876046 kubelet[2539]: I1213 14:08:03.876028 2539 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:08:03.879253 kubelet[2539]: I1213 14:08:03.879216 2539 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:08:03.880116 kubelet[2539]: I1213 14:08:03.880081 2539 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:08:03.880249 kubelet[2539]: I1213 14:08:03.880231 2539 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:08:03.893349 kubelet[2539]: I1213 14:08:03.893322 2539 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:08:03.894310 kubelet[2539]: I1213 14:08:03.894295 2539 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:08:03.894404 kubelet[2539]: I1213 14:08:03.894395 2539 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:08:03.894481 kubelet[2539]: I1213 14:08:03.894472 2539 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:08:03.894575 kubelet[2539]: E1213 14:08:03.894566 2539 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:08:03.913218 kubelet[2539]: I1213 14:08:03.913175 2539 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:08:03.913376 kubelet[2539]: I1213 14:08:03.913288 2539 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:08:03.915669 kubelet[2539]: I1213 14:08:03.915638 2539 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:08:03.915929 kubelet[2539]: E1213 14:08:03.915914 2539 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:08:03.957802 kubelet[2539]: I1213 14:08:03.957768 2539 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:08:03.957802 kubelet[2539]: I1213 14:08:03.957796 2539 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:08:03.957978 kubelet[2539]: I1213 14:08:03.957819 2539 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:08:03.958113 kubelet[2539]: I1213 14:08:03.958091 2539 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:08:03.958145 kubelet[2539]: I1213 14:08:03.958124 2539 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:08:03.958145 kubelet[2539]: I1213 14:08:03.958133 2539 policy_none.go:49] "None policy: Start" Dec 13 14:08:03.959181 kubelet[2539]: I1213 14:08:03.959159 2539 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:08:03.959238 kubelet[2539]: I1213 14:08:03.959189 2539 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:08:03.959390 kubelet[2539]: I1213 14:08:03.959371 2539 state_mem.go:75] "Updated machine memory state" Dec 13 14:08:03.963035 kubelet[2539]: I1213 14:08:03.963018 2539 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:08:03.962000 audit[2539]: AVC avc: denied { mac_admin } for pid=2539 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.962000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:08:03.962000 audit[2539]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d12480 a1=400115a510 a2=4000d12450 a3=25 items=0 ppid=1 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:08:03.965053 kubelet[2539]: I1213 14:08:03.964786 2539 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:08:03.965053 kubelet[2539]: I1213 14:08:03.965012 2539 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:08:03.982816 kubelet[2539]: I1213 14:08:03.982786 2539 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:03.994255 kubelet[2539]: I1213 14:08:03.994226 2539 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:03.994477 kubelet[2539]: I1213 14:08:03.994466 2539 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:03.994744 kubelet[2539]: I1213 14:08:03.994728 2539 topology_manager.go:215] "Topology Admit Handler" podUID="2591dd3fe987c852eceb7ac55dd7758c" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:03.994910 kubelet[2539]: I1213 14:08:03.994898 2539 topology_manager.go:215] "Topology Admit Handler" podUID="385ee58521fc27a9cfcbff8822f372d0" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:03.995037 kubelet[2539]: I1213 14:08:03.995025 2539 topology_manager.go:215] "Topology Admit Handler" podUID="12ed49a8ecde5cffdff8240bd9c2de69" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.005814 kubelet[2539]: W1213 14:08:04.005790 2539 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:08:04.010882 kubelet[2539]: W1213 14:08:04.010859 2539 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:08:04.011141 kubelet[2539]: W1213 14:08:04.011109 2539 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:08:04.080926 kubelet[2539]: I1213 14:08:04.080886 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2591dd3fe987c852eceb7ac55dd7758c-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-52bcbbb462\" (UID: \"2591dd3fe987c852eceb7ac55dd7758c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.080926 kubelet[2539]: I1213 14:08:04.080928 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081100 kubelet[2539]: I1213 14:08:04.080950 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081100 kubelet[2539]: I1213 14:08:04.080984 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2591dd3fe987c852eceb7ac55dd7758c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-52bcbbb462\" (UID: \"2591dd3fe987c852eceb7ac55dd7758c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081100 kubelet[2539]: I1213 14:08:04.081008 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2591dd3fe987c852eceb7ac55dd7758c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-52bcbbb462\" (UID: \"2591dd3fe987c852eceb7ac55dd7758c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081100 kubelet[2539]: I1213 14:08:04.081026 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081100 kubelet[2539]: I1213 14:08:04.081059 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081213 kubelet[2539]: I1213 14:08:04.081081 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/385ee58521fc27a9cfcbff8822f372d0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-52bcbbb462\" (UID: \"385ee58521fc27a9cfcbff8822f372d0\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.081213 kubelet[2539]: I1213 14:08:04.081103 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/12ed49a8ecde5cffdff8240bd9c2de69-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-52bcbbb462\" (UID: \"12ed49a8ecde5cffdff8240bd9c2de69\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:04.856117 kubelet[2539]: I1213 14:08:04.856078 2539 apiserver.go:52] "Watching apiserver" Dec 13 14:08:04.880368 kubelet[2539]: I1213 14:08:04.880333 2539 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:08:04.957348 kubelet[2539]: I1213 14:08:04.957319 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-52bcbbb462" podStartSLOduration=0.957257077 podStartE2EDuration="957.257077ms" podCreationTimestamp="2024-12-13 14:08:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:04.946780324 +0000 UTC m=+1.165711598" watchObservedRunningTime="2024-12-13 14:08:04.957257077 +0000 UTC m=+1.176188351" Dec 13 14:08:04.967867 kubelet[2539]: I1213 14:08:04.967837 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-52bcbbb462" podStartSLOduration=1.967777788 podStartE2EDuration="1.967777788s" podCreationTimestamp="2024-12-13 14:08:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:04.95784129 +0000 UTC m=+1.176772564" watchObservedRunningTime="2024-12-13 14:08:04.967777788 +0000 UTC m=+1.186709062" Dec 13 14:08:04.981234 kubelet[2539]: I1213 14:08:04.981206 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-52bcbbb462" podStartSLOduration=0.981154206 podStartE2EDuration="981.154206ms" podCreationTimestamp="2024-12-13 14:08:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:04.968633908 +0000 UTC m=+1.187565182" watchObservedRunningTime="2024-12-13 14:08:04.981154206 +0000 UTC m=+1.200085480" Dec 13 14:08:11.084919 sudo[1848]: pam_unix(sudo:session): session closed for user root Dec 13 14:08:11.084000 audit[1848]: USER_END pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:08:11.090157 kernel: kauditd_printk_skb: 272 callbacks suppressed Dec 13 14:08:11.090272 kernel: audit: type=1106 audit(1734098891.084:805): pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:08:11.084000 audit[1848]: CRED_DISP pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:08:11.129817 kernel: audit: type=1104 audit(1734098891.084:806): pid=1848 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:08:11.186970 sshd[1845]: pam_unix(sshd:session): session closed for user core Dec 13 14:08:11.187000 audit[1845]: USER_END pid=1845 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:08:11.189687 systemd[1]: sshd@6-10.200.20.4:22-10.200.16.10:43380.service: Deactivated successfully. Dec 13 14:08:11.190417 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:08:11.187000 audit[1845]: CRED_DISP pid=1845 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:08:11.190551 systemd[1]: session-9.scope: Consumed 7.025s CPU time. Dec 13 14:08:11.216689 systemd-logind[1445]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:08:11.239487 kernel: audit: type=1106 audit(1734098891.187:807): pid=1845 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:08:11.239630 kernel: audit: type=1104 audit(1734098891.187:808): pid=1845 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:08:11.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.16.10:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:11.262189 kernel: audit: type=1131 audit(1734098891.189:809): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.16.10:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:08:11.262266 systemd-logind[1445]: Removed session 9. Dec 13 14:08:17.418000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.418000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40013e7fc0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.441858 kernel: audit: type=1400 audit(1734098897.418:810): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.469745 kernel: audit: type=1300 audit(1734098897.418:810): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40013e7fc0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.418000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.492738 kernel: audit: type=1327 audit(1734098897.418:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.418000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001510000 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.515492 kernel: audit: type=1400 audit(1734098897.418:811): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.515566 kernel: audit: type=1300 audit(1734098897.418:811): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001510000 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.565290 kernel: audit: type=1327 audit(1734098897.418:811): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.419000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.586616 kernel: audit: type=1400 audit(1734098897.419:812): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.586826 kernel: audit: type=1300 audit(1734098897.419:812): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001510040 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.419000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001510040 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.637458 kernel: audit: type=1327 audit(1734098897.419:812): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.419000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.658606 kernel: audit: type=1400 audit(1734098897.419:813): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:17.419000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001510080 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:17.613000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:08:17.613000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ac22c0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:17.613000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:18.006558 kubelet[2539]: I1213 14:08:18.006520 2539 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:08:18.007295 env[1458]: time="2024-12-13T14:08:18.007195588Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:08:18.007776 kubelet[2539]: I1213 14:08:18.007756 2539 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:08:18.698987 kubelet[2539]: I1213 14:08:18.698932 2539 topology_manager.go:215] "Topology Admit Handler" podUID="9d8838d4-bdf9-461e-bafd-268cdc46b8e2" podNamespace="kube-system" podName="kube-proxy-tncjh" Dec 13 14:08:18.702514 kubelet[2539]: W1213 14:08:18.702464 2539 reflector.go:539] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:18.702514 kubelet[2539]: E1213 14:08:18.702515 2539 reflector.go:147] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:18.702657 kubelet[2539]: W1213 14:08:18.702551 2539 reflector.go:539] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:18.702657 kubelet[2539]: E1213 14:08:18.702561 2539 reflector.go:147] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:18.704305 systemd[1]: Created slice kubepods-besteffort-pod9d8838d4_bdf9_461e_bafd_268cdc46b8e2.slice. Dec 13 14:08:18.875444 kubelet[2539]: I1213 14:08:18.875405 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9d8838d4-bdf9-461e-bafd-268cdc46b8e2-lib-modules\") pod \"kube-proxy-tncjh\" (UID: \"9d8838d4-bdf9-461e-bafd-268cdc46b8e2\") " pod="kube-system/kube-proxy-tncjh" Dec 13 14:08:18.875596 kubelet[2539]: I1213 14:08:18.875479 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ptdlz\" (UniqueName: \"kubernetes.io/projected/9d8838d4-bdf9-461e-bafd-268cdc46b8e2-kube-api-access-ptdlz\") pod \"kube-proxy-tncjh\" (UID: \"9d8838d4-bdf9-461e-bafd-268cdc46b8e2\") " pod="kube-system/kube-proxy-tncjh" Dec 13 14:08:18.875596 kubelet[2539]: I1213 14:08:18.875504 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9d8838d4-bdf9-461e-bafd-268cdc46b8e2-kube-proxy\") pod \"kube-proxy-tncjh\" (UID: \"9d8838d4-bdf9-461e-bafd-268cdc46b8e2\") " pod="kube-system/kube-proxy-tncjh" Dec 13 14:08:18.875596 kubelet[2539]: I1213 14:08:18.875563 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9d8838d4-bdf9-461e-bafd-268cdc46b8e2-xtables-lock\") pod \"kube-proxy-tncjh\" (UID: \"9d8838d4-bdf9-461e-bafd-268cdc46b8e2\") " pod="kube-system/kube-proxy-tncjh" Dec 13 14:08:19.066553 kubelet[2539]: I1213 14:08:19.066448 2539 topology_manager.go:215] "Topology Admit Handler" podUID="cfb7a04c-26b4-41c4-9f20-1a0954fd078c" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-22fhz" Dec 13 14:08:19.071701 systemd[1]: Created slice kubepods-besteffort-podcfb7a04c_26b4_41c4_9f20_1a0954fd078c.slice. Dec 13 14:08:19.077587 kubelet[2539]: I1213 14:08:19.077560 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cfb7a04c-26b4-41c4-9f20-1a0954fd078c-var-lib-calico\") pod \"tigera-operator-c7ccbd65-22fhz\" (UID: \"cfb7a04c-26b4-41c4-9f20-1a0954fd078c\") " pod="tigera-operator/tigera-operator-c7ccbd65-22fhz" Dec 13 14:08:19.077818 kubelet[2539]: I1213 14:08:19.077803 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ccqg\" (UniqueName: \"kubernetes.io/projected/cfb7a04c-26b4-41c4-9f20-1a0954fd078c-kube-api-access-2ccqg\") pod \"tigera-operator-c7ccbd65-22fhz\" (UID: \"cfb7a04c-26b4-41c4-9f20-1a0954fd078c\") " pod="tigera-operator/tigera-operator-c7ccbd65-22fhz" Dec 13 14:08:19.375478 env[1458]: time="2024-12-13T14:08:19.375041971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-22fhz,Uid:cfb7a04c-26b4-41c4-9f20-1a0954fd078c,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:08:19.428960 env[1458]: time="2024-12-13T14:08:19.428883083Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:19.428960 env[1458]: time="2024-12-13T14:08:19.428929242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:19.429169 env[1458]: time="2024-12-13T14:08:19.428939321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:19.433620 env[1458]: time="2024-12-13T14:08:19.432874426Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/316cbaab624c5ee64165af0332f3283e0f1f508ebfe803f5311d486c77c4072e pid=2624 runtime=io.containerd.runc.v2 Dec 13 14:08:19.448613 systemd[1]: run-containerd-runc-k8s.io-316cbaab624c5ee64165af0332f3283e0f1f508ebfe803f5311d486c77c4072e-runc.LDsgTj.mount: Deactivated successfully. Dec 13 14:08:19.450244 systemd[1]: Started cri-containerd-316cbaab624c5ee64165af0332f3283e0f1f508ebfe803f5311d486c77c4072e.scope. Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit: BPF prog-id=101 op=LOAD Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2624 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:19.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331366362616162363234633565653634313635616630333332663332 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2624 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:19.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331366362616162363234633565653634313635616630333332663332 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit: BPF prog-id=102 op=LOAD Dec 13 14:08:19.460000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2624 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:19.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331366362616162363234633565653634313635616630333332663332 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit: BPF prog-id=103 op=LOAD Dec 13 14:08:19.460000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2624 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:19.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331366362616162363234633565653634313635616630333332663332 Dec 13 14:08:19.460000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:08:19.460000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:19.460000 audit: BPF prog-id=104 op=LOAD Dec 13 14:08:19.460000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2624 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:19.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331366362616162363234633565653634313635616630333332663332 Dec 13 14:08:19.480112 env[1458]: time="2024-12-13T14:08:19.480072447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-22fhz,Uid:cfb7a04c-26b4-41c4-9f20-1a0954fd078c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"316cbaab624c5ee64165af0332f3283e0f1f508ebfe803f5311d486c77c4072e\"" Dec 13 14:08:19.482077 env[1458]: time="2024-12-13T14:08:19.482049699Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:08:19.985070 kubelet[2539]: E1213 14:08:19.985034 2539 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:19.985070 kubelet[2539]: E1213 14:08:19.985067 2539 projected.go:200] Error preparing data for projected volume kube-api-access-ptdlz for pod kube-system/kube-proxy-tncjh: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:19.985283 kubelet[2539]: E1213 14:08:19.985127 2539 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/9d8838d4-bdf9-461e-bafd-268cdc46b8e2-kube-api-access-ptdlz podName:9d8838d4-bdf9-461e-bafd-268cdc46b8e2 nodeName:}" failed. No retries permitted until 2024-12-13 14:08:20.485106237 +0000 UTC m=+16.704037511 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-ptdlz" (UniqueName: "kubernetes.io/projected/9d8838d4-bdf9-461e-bafd-268cdc46b8e2-kube-api-access-ptdlz") pod "kube-proxy-tncjh" (UID: "9d8838d4-bdf9-461e-bafd-268cdc46b8e2") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:20.513873 env[1458]: time="2024-12-13T14:08:20.513824255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tncjh,Uid:9d8838d4-bdf9-461e-bafd-268cdc46b8e2,Namespace:kube-system,Attempt:0,}" Dec 13 14:08:20.550967 env[1458]: time="2024-12-13T14:08:20.550883486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:20.550967 env[1458]: time="2024-12-13T14:08:20.550926325Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:20.550967 env[1458]: time="2024-12-13T14:08:20.550936404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:20.551365 env[1458]: time="2024-12-13T14:08:20.551318752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89b4124a1a6c6b5aa6ee3faf20b5dea0458a0b9e86f28ff588f9c5f2193b786c pid=2665 runtime=io.containerd.runc.v2 Dec 13 14:08:20.569653 systemd[1]: Started cri-containerd-89b4124a1a6c6b5aa6ee3faf20b5dea0458a0b9e86f28ff588f9c5f2193b786c.scope. Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.582000 audit: BPF prog-id=105 op=LOAD Dec 13 14:08:20.582000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.582000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2665 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623431323461316136633662356161366565336661663230623564 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2665 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623431323461316136633662356161366565336661663230623564 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.583000 audit: BPF prog-id=106 op=LOAD Dec 13 14:08:20.583000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2665 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623431323461316136633662356161366565336661663230623564 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.584000 audit: BPF prog-id=107 op=LOAD Dec 13 14:08:20.584000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2665 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623431323461316136633662356161366565336661663230623564 Dec 13 14:08:20.584000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:08:20.584000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.585000 audit: BPF prog-id=108 op=LOAD Dec 13 14:08:20.585000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2665 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623431323461316136633662356161366565336661663230623564 Dec 13 14:08:20.597621 env[1458]: time="2024-12-13T14:08:20.597584393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-tncjh,Uid:9d8838d4-bdf9-461e-bafd-268cdc46b8e2,Namespace:kube-system,Attempt:0,} returns sandbox id \"89b4124a1a6c6b5aa6ee3faf20b5dea0458a0b9e86f28ff588f9c5f2193b786c\"" Dec 13 14:08:20.602002 env[1458]: time="2024-12-13T14:08:20.601967205Z" level=info msg="CreateContainer within sandbox \"89b4124a1a6c6b5aa6ee3faf20b5dea0458a0b9e86f28ff588f9c5f2193b786c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:08:20.650002 env[1458]: time="2024-12-13T14:08:20.649954589Z" level=info msg="CreateContainer within sandbox \"89b4124a1a6c6b5aa6ee3faf20b5dea0458a0b9e86f28ff588f9c5f2193b786c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7347dd243303e5782b6318b9a41566cf77a243abef85bbac372df50520c36c79\"" Dec 13 14:08:20.652326 env[1458]: time="2024-12-13T14:08:20.652192913Z" level=info msg="StartContainer for \"7347dd243303e5782b6318b9a41566cf77a243abef85bbac372df50520c36c79\"" Dec 13 14:08:20.668065 systemd[1]: Started cri-containerd-7347dd243303e5782b6318b9a41566cf77a243abef85bbac372df50520c36c79.scope. Dec 13 14:08:20.683000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.683000 audit[2704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2665 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733343764643234333330336535373832623633313862396134313536 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit: BPF prog-id=109 op=LOAD Dec 13 14:08:20.684000 audit[2704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2665 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733343764643234333330336535373832623633313862396134313536 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.684000 audit: BPF prog-id=110 op=LOAD Dec 13 14:08:20.684000 audit[2704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2665 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733343764643234333330336535373832623633313862396134313536 Dec 13 14:08:20.685000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:08:20.685000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.685000 audit: BPF prog-id=111 op=LOAD Dec 13 14:08:20.685000 audit[2704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2665 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733343764643234333330336535373832623633313862396134313536 Dec 13 14:08:20.707824 env[1458]: time="2024-12-13T14:08:20.707765841Z" level=info msg="StartContainer for \"7347dd243303e5782b6318b9a41566cf77a243abef85bbac372df50520c36c79\" returns successfully" Dec 13 14:08:20.754000 audit[2757]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.754000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4fbcea0 a2=0 a3=1 items=0 ppid=2715 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:08:20.754000 audit[2758]: NETFILTER_CFG table=mangle:43 family=10 entries=1 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.754000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc27f8970 a2=0 a3=1 items=0 ppid=2715 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:08:20.755000 audit[2759]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.755000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd5e1650 a2=0 a3=1 items=0 ppid=2715 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:08:20.756000 audit[2761]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.756000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6985f30 a2=0 a3=1 items=0 ppid=2715 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:08:20.756000 audit[2760]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.756000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc63bf370 a2=0 a3=1 items=0 ppid=2715 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:08:20.761000 audit[2762]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.761000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4aab540 a2=0 a3=1 items=0 ppid=2715 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:08:20.859000 audit[2763]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.859000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe8b24270 a2=0 a3=1 items=0 ppid=2715 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:08:20.865000 audit[2765]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.865000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc127b590 a2=0 a3=1 items=0 ppid=2715 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:08:20.868000 audit[2768]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.868000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeb440430 a2=0 a3=1 items=0 ppid=2715 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:08:20.869000 audit[2769]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.869000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4eea9d0 a2=0 a3=1 items=0 ppid=2715 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:08:20.871000 audit[2771]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.871000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa8f7220 a2=0 a3=1 items=0 ppid=2715 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:08:20.872000 audit[2772]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.872000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2f03e90 a2=0 a3=1 items=0 ppid=2715 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:08:20.875000 audit[2774]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.875000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc48783a0 a2=0 a3=1 items=0 ppid=2715 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:08:20.878000 audit[2777]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.878000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffb061020 a2=0 a3=1 items=0 ppid=2715 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:08:20.879000 audit[2778]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.879000 audit[2778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd46c5340 a2=0 a3=1 items=0 ppid=2715 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:08:20.881000 audit[2780]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.881000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcd9ea3f0 a2=0 a3=1 items=0 ppid=2715 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:08:20.884000 audit[2781]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.884000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9ee36b0 a2=0 a3=1 items=0 ppid=2715 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:08:20.886000 audit[2783]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.886000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7760820 a2=0 a3=1 items=0 ppid=2715 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:08:20.889000 audit[2786]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.889000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff1284f90 a2=0 a3=1 items=0 ppid=2715 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:08:20.892000 audit[2789]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.892000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff39c2000 a2=0 a3=1 items=0 ppid=2715 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:08:20.893000 audit[2790]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.893000 audit[2790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdd22a330 a2=0 a3=1 items=0 ppid=2715 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:08:20.895000 audit[2792]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.895000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff60a1910 a2=0 a3=1 items=0 ppid=2715 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:08:20.899000 audit[2795]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.899000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc10e520 a2=0 a3=1 items=0 ppid=2715 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:08:20.899000 audit[2796]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.899000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff83cf380 a2=0 a3=1 items=0 ppid=2715 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:08:20.902000 audit[2798]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:08:20.902000 audit[2798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffddb1d6a0 a2=0 a3=1 items=0 ppid=2715 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:08:20.926000 audit[2804]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:20.926000 audit[2804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff9f63770 a2=0 a3=1 items=0 ppid=2715 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:20.940000 audit[2804]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:20.940000 audit[2804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff9f63770 a2=0 a3=1 items=0 ppid=2715 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:20.942000 audit[2809]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.942000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff31c3100 a2=0 a3=1 items=0 ppid=2715 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:08:20.944000 audit[2811]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.944000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde40a5a0 a2=0 a3=1 items=0 ppid=2715 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:08:20.948000 audit[2814]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.948000 audit[2814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde2d3e60 a2=0 a3=1 items=0 ppid=2715 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:08:20.949000 audit[2815]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.949000 audit[2815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcada7040 a2=0 a3=1 items=0 ppid=2715 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:08:20.954000 audit[2817]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.954000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc01e3a10 a2=0 a3=1 items=0 ppid=2715 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:08:20.957000 audit[2818]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.957000 audit[2818]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda1721b0 a2=0 a3=1 items=0 ppid=2715 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:08:20.963000 audit[2820]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.963000 audit[2820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc5d953b0 a2=0 a3=1 items=0 ppid=2715 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:08:20.976000 audit[2823]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.976000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffc713320 a2=0 a3=1 items=0 ppid=2715 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:08:20.978000 audit[2824]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.978000 audit[2824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe43f33a0 a2=0 a3=1 items=0 ppid=2715 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:08:20.982000 audit[2826]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.982000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdc883960 a2=0 a3=1 items=0 ppid=2715 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:08:20.982000 audit[2827]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.982000 audit[2827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4aa77d0 a2=0 a3=1 items=0 ppid=2715 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:08:20.984000 audit[2829]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.984000 audit[2829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe285bfe0 a2=0 a3=1 items=0 ppid=2715 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:08:20.990000 audit[2832]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.990000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd18ec660 a2=0 a3=1 items=0 ppid=2715 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:08:20.993000 audit[2835]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.993000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffded68c30 a2=0 a3=1 items=0 ppid=2715 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:08:20.994000 audit[2836]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.994000 audit[2836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe4399fa0 a2=0 a3=1 items=0 ppid=2715 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:08:20.996000 audit[2838]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.996000 audit[2838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffecdec680 a2=0 a3=1 items=0 ppid=2715 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:08:20.998000 audit[2841]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.998000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcb7e2780 a2=0 a3=1 items=0 ppid=2715 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:08:20.999000 audit[2842]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:20.999000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8fb94a0 a2=0 a3=1 items=0 ppid=2715 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:08:21.001000 audit[2844]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:21.001000 audit[2844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc2447040 a2=0 a3=1 items=0 ppid=2715 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:08:21.002000 audit[2845]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:21.002000 audit[2845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc853ea00 a2=0 a3=1 items=0 ppid=2715 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:08:21.004000 audit[2847]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:21.004000 audit[2847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffab51f20 a2=0 a3=1 items=0 ppid=2715 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:08:21.007000 audit[2850]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:08:21.007000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff524090 a2=0 a3=1 items=0 ppid=2715 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:08:21.010000 audit[2852]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:08:21.010000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe7528770 a2=0 a3=1 items=0 ppid=2715 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.010000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:21.010000 audit[2852]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:08:21.010000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe7528770 a2=0 a3=1 items=0 ppid=2715 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:21.010000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:21.490184 systemd[1]: run-containerd-runc-k8s.io-89b4124a1a6c6b5aa6ee3faf20b5dea0458a0b9e86f28ff588f9c5f2193b786c-runc.OFDWi2.mount: Deactivated successfully. Dec 13 14:08:22.032624 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2602933443.mount: Deactivated successfully. Dec 13 14:08:22.536005 env[1458]: time="2024-12-13T14:08:22.535957653Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:22.540680 env[1458]: time="2024-12-13T14:08:22.540605782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:22.544595 env[1458]: time="2024-12-13T14:08:22.544565573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:22.550228 env[1458]: time="2024-12-13T14:08:22.550189830Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:22.551128 env[1458]: time="2024-12-13T14:08:22.551100641Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:08:22.555658 env[1458]: time="2024-12-13T14:08:22.555626054Z" level=info msg="CreateContainer within sandbox \"316cbaab624c5ee64165af0332f3283e0f1f508ebfe803f5311d486c77c4072e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:08:22.584071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1880041010.mount: Deactivated successfully. Dec 13 14:08:22.589658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3867553207.mount: Deactivated successfully. Dec 13 14:08:22.600560 env[1458]: time="2024-12-13T14:08:22.600461957Z" level=info msg="CreateContainer within sandbox \"316cbaab624c5ee64165af0332f3283e0f1f508ebfe803f5311d486c77c4072e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"27da63e9d7bbbf66b3f602596e265ad00ac873255b827ee49ccc11ea416331e8\"" Dec 13 14:08:22.601283 env[1458]: time="2024-12-13T14:08:22.601257011Z" level=info msg="StartContainer for \"27da63e9d7bbbf66b3f602596e265ad00ac873255b827ee49ccc11ea416331e8\"" Dec 13 14:08:22.620452 systemd[1]: Started cri-containerd-27da63e9d7bbbf66b3f602596e265ad00ac873255b827ee49ccc11ea416331e8.scope. Dec 13 14:08:22.648297 kernel: kauditd_printk_skb: 315 callbacks suppressed Dec 13 14:08:22.648405 kernel: audit: type=1400 audit(1734098902.642:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.681755 kernel: audit: type=1400 audit(1734098902.642:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.699064 kernel: audit: type=1400 audit(1734098902.642:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.715945 kernel: audit: type=1400 audit(1734098902.642:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.733797 kernel: audit: type=1400 audit(1734098902.642:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.769880 kernel: audit: type=1400 audit(1734098902.642:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.769999 kernel: audit: type=1400 audit(1734098902.642:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.789482 kernel: audit: type=1400 audit(1734098902.642:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.806762 kernel: audit: type=1400 audit(1734098902.642:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.809024 env[1458]: time="2024-12-13T14:08:22.808986340Z" level=info msg="StartContainer for \"27da63e9d7bbbf66b3f602596e265ad00ac873255b827ee49ccc11ea416331e8\" returns successfully" Dec 13 14:08:22.823016 kernel: audit: type=1400 audit(1734098902.647:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.647000 audit: BPF prog-id=112 op=LOAD Dec 13 14:08:22.663000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.663000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2624 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646136336539643762626266363662336636303235393665323635 Dec 13 14:08:22.663000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.663000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2624 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646136336539643762626266363662336636303235393665323635 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit: BPF prog-id=113 op=LOAD Dec 13 14:08:22.664000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2624 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646136336539643762626266363662336636303235393665323635 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit: BPF prog-id=114 op=LOAD Dec 13 14:08:22.664000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2624 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646136336539643762626266363662336636303235393665323635 Dec 13 14:08:22.664000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:08:22.664000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:22.664000 audit: BPF prog-id=115 op=LOAD Dec 13 14:08:22.664000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2624 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646136336539643762626266363662336636303235393665323635 Dec 13 14:08:22.973732 kubelet[2539]: I1213 14:08:22.973673 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-tncjh" podStartSLOduration=4.973632989 podStartE2EDuration="4.973632989s" podCreationTimestamp="2024-12-13 14:08:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:20.971545394 +0000 UTC m=+17.190476788" watchObservedRunningTime="2024-12-13 14:08:22.973632989 +0000 UTC m=+19.192564263" Dec 13 14:08:22.974283 kubelet[2539]: I1213 14:08:22.974258 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-22fhz" podStartSLOduration=0.904133343 podStartE2EDuration="3.97422929s" podCreationTimestamp="2024-12-13 14:08:19 +0000 UTC" firstStartedPulling="2024-12-13 14:08:19.481414441 +0000 UTC m=+15.700345715" lastFinishedPulling="2024-12-13 14:08:22.551510388 +0000 UTC m=+18.770441662" observedRunningTime="2024-12-13 14:08:22.97421897 +0000 UTC m=+19.193150244" watchObservedRunningTime="2024-12-13 14:08:22.97422929 +0000 UTC m=+19.193160524" Dec 13 14:08:26.525000 audit[2892]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.525000 audit[2892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff79af300 a2=0 a3=1 items=0 ppid=2715 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.535000 audit[2892]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.535000 audit[2892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff79af300 a2=0 a3=1 items=0 ppid=2715 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.544000 audit[2894]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.544000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7e2dc60 a2=0 a3=1 items=0 ppid=2715 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.548000 audit[2894]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.548000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd7e2dc60 a2=0 a3=1 items=0 ppid=2715 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.726136 kubelet[2539]: I1213 14:08:26.726083 2539 topology_manager.go:215] "Topology Admit Handler" podUID="0ecb39f1-10d8-4646-8507-2f14787063ee" podNamespace="calico-system" podName="calico-typha-7788cc4b4d-q5fh5" Dec 13 14:08:26.732516 systemd[1]: Created slice kubepods-besteffort-pod0ecb39f1_10d8_4646_8507_2f14787063ee.slice. Dec 13 14:08:26.802874 kubelet[2539]: I1213 14:08:26.802768 2539 topology_manager.go:215] "Topology Admit Handler" podUID="b2817bbc-3443-49bd-99b4-34a087f3ba30" podNamespace="calico-system" podName="calico-node-flbql" Dec 13 14:08:26.808541 systemd[1]: Created slice kubepods-besteffort-podb2817bbc_3443_49bd_99b4_34a087f3ba30.slice. Dec 13 14:08:26.818803 kubelet[2539]: I1213 14:08:26.818771 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b2817bbc-3443-49bd-99b4-34a087f3ba30-node-certs\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.818978 kubelet[2539]: I1213 14:08:26.818966 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-var-lib-calico\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819050 kubelet[2539]: I1213 14:08:26.819041 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0ecb39f1-10d8-4646-8507-2f14787063ee-typha-certs\") pod \"calico-typha-7788cc4b4d-q5fh5\" (UID: \"0ecb39f1-10d8-4646-8507-2f14787063ee\") " pod="calico-system/calico-typha-7788cc4b4d-q5fh5" Dec 13 14:08:26.819155 kubelet[2539]: I1213 14:08:26.819144 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-policysync\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819237 kubelet[2539]: I1213 14:08:26.819227 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-flexvol-driver-host\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819319 kubelet[2539]: I1213 14:08:26.819310 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v5mj7\" (UniqueName: \"kubernetes.io/projected/0ecb39f1-10d8-4646-8507-2f14787063ee-kube-api-access-v5mj7\") pod \"calico-typha-7788cc4b4d-q5fh5\" (UID: \"0ecb39f1-10d8-4646-8507-2f14787063ee\") " pod="calico-system/calico-typha-7788cc4b4d-q5fh5" Dec 13 14:08:26.819394 kubelet[2539]: I1213 14:08:26.819385 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-lib-modules\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819468 kubelet[2539]: I1213 14:08:26.819460 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bbrvg\" (UniqueName: \"kubernetes.io/projected/b2817bbc-3443-49bd-99b4-34a087f3ba30-kube-api-access-bbrvg\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819559 kubelet[2539]: I1213 14:08:26.819549 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-xtables-lock\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819640 kubelet[2539]: I1213 14:08:26.819631 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b2817bbc-3443-49bd-99b4-34a087f3ba30-tigera-ca-bundle\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819743 kubelet[2539]: I1213 14:08:26.819733 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-var-run-calico\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819824 kubelet[2539]: I1213 14:08:26.819816 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0ecb39f1-10d8-4646-8507-2f14787063ee-tigera-ca-bundle\") pod \"calico-typha-7788cc4b4d-q5fh5\" (UID: \"0ecb39f1-10d8-4646-8507-2f14787063ee\") " pod="calico-system/calico-typha-7788cc4b4d-q5fh5" Dec 13 14:08:26.819903 kubelet[2539]: I1213 14:08:26.819894 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-cni-bin-dir\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.819992 kubelet[2539]: I1213 14:08:26.819982 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-cni-net-dir\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.820070 kubelet[2539]: I1213 14:08:26.820060 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b2817bbc-3443-49bd-99b4-34a087f3ba30-cni-log-dir\") pod \"calico-node-flbql\" (UID: \"b2817bbc-3443-49bd-99b4-34a087f3ba30\") " pod="calico-system/calico-node-flbql" Dec 13 14:08:26.922938 kubelet[2539]: E1213 14:08:26.922901 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.922938 kubelet[2539]: W1213 14:08:26.922927 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.923159 kubelet[2539]: E1213 14:08:26.922950 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.925287 kubelet[2539]: E1213 14:08:26.925255 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.925287 kubelet[2539]: W1213 14:08:26.925276 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.935092 kubelet[2539]: E1213 14:08:26.933246 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.943002 kubelet[2539]: E1213 14:08:26.942971 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.943002 kubelet[2539]: W1213 14:08:26.942994 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.943453 kubelet[2539]: E1213 14:08:26.943433 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.943453 kubelet[2539]: W1213 14:08:26.943449 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.944815 kubelet[2539]: E1213 14:08:26.944792 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.944913 kubelet[2539]: E1213 14:08:26.944842 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.950886 kubelet[2539]: E1213 14:08:26.950812 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.950886 kubelet[2539]: W1213 14:08:26.950832 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.951295 kubelet[2539]: E1213 14:08:26.951237 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.951295 kubelet[2539]: W1213 14:08:26.951291 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.951454 kubelet[2539]: E1213 14:08:26.951439 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.951959 kubelet[2539]: E1213 14:08:26.951900 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.959877 kubelet[2539]: E1213 14:08:26.959847 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.959877 kubelet[2539]: W1213 14:08:26.959870 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.960056 kubelet[2539]: E1213 14:08:26.960003 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.960543 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.963830 kubelet[2539]: W1213 14:08:26.960563 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.960644 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.960787 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.963830 kubelet[2539]: W1213 14:08:26.960795 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.960861 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.960980 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.963830 kubelet[2539]: W1213 14:08:26.960988 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.961053 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.963830 kubelet[2539]: E1213 14:08:26.961139 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.964119 kubelet[2539]: W1213 14:08:26.961145 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.964119 kubelet[2539]: E1213 14:08:26.961204 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.964119 kubelet[2539]: E1213 14:08:26.961290 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.964119 kubelet[2539]: W1213 14:08:26.961297 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.964119 kubelet[2539]: E1213 14:08:26.961352 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.964119 kubelet[2539]: E1213 14:08:26.961427 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.964119 kubelet[2539]: W1213 14:08:26.961432 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.964119 kubelet[2539]: E1213 14:08:26.961487 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.964119 kubelet[2539]: E1213 14:08:26.961559 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.964119 kubelet[2539]: W1213 14:08:26.961564 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.964325 kubelet[2539]: E1213 14:08:26.961624 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.964325 kubelet[2539]: E1213 14:08:26.962404 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.964325 kubelet[2539]: W1213 14:08:26.962415 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.964325 kubelet[2539]: E1213 14:08:26.962433 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.964796 kubelet[2539]: E1213 14:08:26.964706 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.964796 kubelet[2539]: W1213 14:08:26.964793 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.964967 kubelet[2539]: E1213 14:08:26.964943 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.965046 kubelet[2539]: E1213 14:08:26.964954 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.965131 kubelet[2539]: W1213 14:08:26.965118 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.967058 kubelet[2539]: E1213 14:08:26.965753 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.967058 kubelet[2539]: I1213 14:08:26.966630 2539 topology_manager.go:215] "Topology Admit Handler" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" podNamespace="calico-system" podName="csi-node-driver-zc9pj" Dec 13 14:08:26.967058 kubelet[2539]: E1213 14:08:26.966930 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:26.967282 kubelet[2539]: E1213 14:08:26.967269 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.967357 kubelet[2539]: W1213 14:08:26.967346 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.967742 kubelet[2539]: E1213 14:08:26.967701 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.969229 kubelet[2539]: E1213 14:08:26.969201 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.969336 kubelet[2539]: W1213 14:08:26.969323 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.969436 kubelet[2539]: E1213 14:08:26.969411 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.969687 kubelet[2539]: E1213 14:08:26.969673 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.969821 kubelet[2539]: W1213 14:08:26.969807 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.969939 kubelet[2539]: E1213 14:08:26.969912 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.970162 kubelet[2539]: E1213 14:08:26.970150 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.970244 kubelet[2539]: W1213 14:08:26.970232 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.970340 kubelet[2539]: E1213 14:08:26.970318 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.970601 kubelet[2539]: E1213 14:08:26.970585 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.970702 kubelet[2539]: W1213 14:08:26.970689 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.970846 kubelet[2539]: E1213 14:08:26.970810 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.971064 kubelet[2539]: E1213 14:08:26.971050 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.971159 kubelet[2539]: W1213 14:08:26.971147 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.971255 kubelet[2539]: E1213 14:08:26.971230 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.972049 kubelet[2539]: E1213 14:08:26.972025 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.972147 kubelet[2539]: W1213 14:08:26.972134 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.972229 kubelet[2539]: E1213 14:08:26.972219 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.972451 kubelet[2539]: E1213 14:08:26.972429 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.972451 kubelet[2539]: W1213 14:08:26.972448 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.972508 kubelet[2539]: E1213 14:08:26.972463 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:26.981481 kubelet[2539]: E1213 14:08:26.979770 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:26.981481 kubelet[2539]: W1213 14:08:26.979818 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:26.981481 kubelet[2539]: E1213 14:08:26.979839 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.020372 kubelet[2539]: E1213 14:08:27.020336 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.020372 kubelet[2539]: W1213 14:08:27.020361 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.020372 kubelet[2539]: E1213 14:08:27.020383 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.020705 kubelet[2539]: E1213 14:08:27.020685 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.020773 kubelet[2539]: W1213 14:08:27.020700 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.020773 kubelet[2539]: E1213 14:08:27.020740 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.020955 kubelet[2539]: E1213 14:08:27.020936 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.020955 kubelet[2539]: W1213 14:08:27.020949 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.021035 kubelet[2539]: E1213 14:08:27.020961 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.021188 kubelet[2539]: E1213 14:08:27.021167 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.021188 kubelet[2539]: W1213 14:08:27.021179 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.021188 kubelet[2539]: E1213 14:08:27.021190 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.021420 kubelet[2539]: E1213 14:08:27.021403 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.021420 kubelet[2539]: W1213 14:08:27.021415 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.021516 kubelet[2539]: E1213 14:08:27.021425 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.021667 kubelet[2539]: E1213 14:08:27.021650 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.021667 kubelet[2539]: W1213 14:08:27.021662 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.021754 kubelet[2539]: E1213 14:08:27.021672 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.021914 kubelet[2539]: E1213 14:08:27.021894 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.021973 kubelet[2539]: W1213 14:08:27.021915 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.021973 kubelet[2539]: E1213 14:08:27.021927 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.022097 kubelet[2539]: E1213 14:08:27.022080 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.022097 kubelet[2539]: W1213 14:08:27.022092 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.022177 kubelet[2539]: E1213 14:08:27.022103 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.022351 kubelet[2539]: E1213 14:08:27.022332 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.022351 kubelet[2539]: W1213 14:08:27.022345 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.022436 kubelet[2539]: E1213 14:08:27.022362 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.022648 kubelet[2539]: E1213 14:08:27.022585 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.022648 kubelet[2539]: W1213 14:08:27.022644 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.022750 kubelet[2539]: E1213 14:08:27.022658 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.022920 kubelet[2539]: E1213 14:08:27.022896 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.022920 kubelet[2539]: W1213 14:08:27.022915 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.023000 kubelet[2539]: E1213 14:08:27.022927 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.023141 kubelet[2539]: E1213 14:08:27.023126 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.023141 kubelet[2539]: W1213 14:08:27.023138 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.023222 kubelet[2539]: E1213 14:08:27.023149 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.023380 kubelet[2539]: E1213 14:08:27.023364 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.023380 kubelet[2539]: W1213 14:08:27.023376 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.023463 kubelet[2539]: E1213 14:08:27.023388 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.023604 kubelet[2539]: E1213 14:08:27.023589 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.023604 kubelet[2539]: W1213 14:08:27.023601 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.023692 kubelet[2539]: E1213 14:08:27.023618 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.023858 kubelet[2539]: E1213 14:08:27.023842 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.023858 kubelet[2539]: W1213 14:08:27.023859 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.023936 kubelet[2539]: E1213 14:08:27.023870 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.024101 kubelet[2539]: E1213 14:08:27.024083 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.024101 kubelet[2539]: W1213 14:08:27.024096 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.024187 kubelet[2539]: E1213 14:08:27.024108 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.024351 kubelet[2539]: E1213 14:08:27.024332 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.024351 kubelet[2539]: W1213 14:08:27.024345 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.024436 kubelet[2539]: E1213 14:08:27.024356 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.024870 kubelet[2539]: E1213 14:08:27.024849 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.024870 kubelet[2539]: W1213 14:08:27.024865 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.024982 kubelet[2539]: E1213 14:08:27.024880 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.025580 kubelet[2539]: E1213 14:08:27.025556 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.025580 kubelet[2539]: W1213 14:08:27.025572 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.025690 kubelet[2539]: E1213 14:08:27.025586 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.026928 kubelet[2539]: E1213 14:08:27.026903 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.026928 kubelet[2539]: W1213 14:08:27.026921 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.026928 kubelet[2539]: E1213 14:08:27.026936 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.028844 kubelet[2539]: E1213 14:08:27.028807 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.028844 kubelet[2539]: W1213 14:08:27.028828 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.028844 kubelet[2539]: E1213 14:08:27.028843 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.028985 kubelet[2539]: I1213 14:08:27.028876 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e44969a5-2dcd-4477-bb78-5481c7c194d8-socket-dir\") pod \"csi-node-driver-zc9pj\" (UID: \"e44969a5-2dcd-4477-bb78-5481c7c194d8\") " pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:27.029208 kubelet[2539]: E1213 14:08:27.029187 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.029208 kubelet[2539]: W1213 14:08:27.029204 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.029294 kubelet[2539]: E1213 14:08:27.029228 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.029294 kubelet[2539]: I1213 14:08:27.029249 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e44969a5-2dcd-4477-bb78-5481c7c194d8-varrun\") pod \"csi-node-driver-zc9pj\" (UID: \"e44969a5-2dcd-4477-bb78-5481c7c194d8\") " pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:27.029502 kubelet[2539]: E1213 14:08:27.029481 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.029502 kubelet[2539]: W1213 14:08:27.029495 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.029576 kubelet[2539]: E1213 14:08:27.029516 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.029576 kubelet[2539]: I1213 14:08:27.029536 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g9zcx\" (UniqueName: \"kubernetes.io/projected/e44969a5-2dcd-4477-bb78-5481c7c194d8-kube-api-access-g9zcx\") pod \"csi-node-driver-zc9pj\" (UID: \"e44969a5-2dcd-4477-bb78-5481c7c194d8\") " pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:27.031835 kubelet[2539]: E1213 14:08:27.031806 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.031835 kubelet[2539]: W1213 14:08:27.031833 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.031946 kubelet[2539]: E1213 14:08:27.031860 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.031946 kubelet[2539]: I1213 14:08:27.031883 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e44969a5-2dcd-4477-bb78-5481c7c194d8-kubelet-dir\") pod \"csi-node-driver-zc9pj\" (UID: \"e44969a5-2dcd-4477-bb78-5481c7c194d8\") " pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:27.032174 kubelet[2539]: E1213 14:08:27.032140 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.032174 kubelet[2539]: W1213 14:08:27.032155 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.032174 kubelet[2539]: E1213 14:08:27.032173 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.032414 kubelet[2539]: E1213 14:08:27.032396 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.032469 kubelet[2539]: W1213 14:08:27.032409 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.032526 kubelet[2539]: E1213 14:08:27.032507 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.032679 kubelet[2539]: E1213 14:08:27.032657 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.032679 kubelet[2539]: W1213 14:08:27.032671 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.032800 kubelet[2539]: E1213 14:08:27.032784 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.032975 kubelet[2539]: E1213 14:08:27.032956 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.032975 kubelet[2539]: W1213 14:08:27.032971 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.033075 kubelet[2539]: E1213 14:08:27.033057 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.033231 kubelet[2539]: E1213 14:08:27.033211 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.033231 kubelet[2539]: W1213 14:08:27.033225 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.033301 kubelet[2539]: E1213 14:08:27.033243 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.033301 kubelet[2539]: I1213 14:08:27.033267 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e44969a5-2dcd-4477-bb78-5481c7c194d8-registration-dir\") pod \"csi-node-driver-zc9pj\" (UID: \"e44969a5-2dcd-4477-bb78-5481c7c194d8\") " pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:27.033497 kubelet[2539]: E1213 14:08:27.033476 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.033497 kubelet[2539]: W1213 14:08:27.033493 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.033581 kubelet[2539]: E1213 14:08:27.033509 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.033755 kubelet[2539]: E1213 14:08:27.033736 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.033755 kubelet[2539]: W1213 14:08:27.033750 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.033843 kubelet[2539]: E1213 14:08:27.033763 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.034005 kubelet[2539]: E1213 14:08:27.033983 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.034005 kubelet[2539]: W1213 14:08:27.033998 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.034076 kubelet[2539]: E1213 14:08:27.034010 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.034203 kubelet[2539]: E1213 14:08:27.034180 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.034203 kubelet[2539]: W1213 14:08:27.034195 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.034275 kubelet[2539]: E1213 14:08:27.034206 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.034440 kubelet[2539]: E1213 14:08:27.034422 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.034440 kubelet[2539]: W1213 14:08:27.034435 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.034514 kubelet[2539]: E1213 14:08:27.034448 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.034670 kubelet[2539]: E1213 14:08:27.034654 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.034670 kubelet[2539]: W1213 14:08:27.034667 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.034772 kubelet[2539]: E1213 14:08:27.034679 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.035314 env[1458]: time="2024-12-13T14:08:27.035271232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7788cc4b4d-q5fh5,Uid:0ecb39f1-10d8-4646-8507-2f14787063ee,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:27.071107 env[1458]: time="2024-12-13T14:08:27.070971167Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:27.071107 env[1458]: time="2024-12-13T14:08:27.071016726Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:27.071278 env[1458]: time="2024-12-13T14:08:27.071027206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:27.071278 env[1458]: time="2024-12-13T14:08:27.071134602Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9265b51c8987f1c7240417482e77bd202107a66b04a37faa951df6b03e1fe1a6 pid=2971 runtime=io.containerd.runc.v2 Dec 13 14:08:27.084752 systemd[1]: Started cri-containerd-9265b51c8987f1c7240417482e77bd202107a66b04a37faa951df6b03e1fe1a6.scope. Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.100000 audit: BPF prog-id=116 op=LOAD Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932363562353163383938376631633732343034313734383265373762 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932363562353163383938376631633732343034313734383265373762 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit: BPF prog-id=117 op=LOAD Dec 13 14:08:27.101000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932363562353163383938376631633732343034313734383265373762 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit: BPF prog-id=118 op=LOAD Dec 13 14:08:27.101000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932363562353163383938376631633732343034313734383265373762 Dec 13 14:08:27.101000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:08:27.101000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.101000 audit: BPF prog-id=119 op=LOAD Dec 13 14:08:27.101000 audit[2982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932363562353163383938376631633732343034313734383265373762 Dec 13 14:08:27.112670 env[1458]: time="2024-12-13T14:08:27.112636084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-flbql,Uid:b2817bbc-3443-49bd-99b4-34a087f3ba30,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:27.122385 env[1458]: time="2024-12-13T14:08:27.122353635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7788cc4b4d-q5fh5,Uid:0ecb39f1-10d8-4646-8507-2f14787063ee,Namespace:calico-system,Attempt:0,} returns sandbox id \"9265b51c8987f1c7240417482e77bd202107a66b04a37faa951df6b03e1fe1a6\"" Dec 13 14:08:27.124191 env[1458]: time="2024-12-13T14:08:27.124166340Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:08:27.134942 kubelet[2539]: E1213 14:08:27.134899 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.134942 kubelet[2539]: W1213 14:08:27.134928 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.135086 kubelet[2539]: E1213 14:08:27.134953 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.135398 kubelet[2539]: E1213 14:08:27.135329 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.135398 kubelet[2539]: W1213 14:08:27.135343 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.135398 kubelet[2539]: E1213 14:08:27.135362 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.136203 kubelet[2539]: E1213 14:08:27.135902 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.136203 kubelet[2539]: W1213 14:08:27.135932 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.136203 kubelet[2539]: E1213 14:08:27.135950 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.136599 kubelet[2539]: E1213 14:08:27.136554 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.136599 kubelet[2539]: W1213 14:08:27.136573 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.136599 kubelet[2539]: E1213 14:08:27.136595 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.136824 kubelet[2539]: E1213 14:08:27.136805 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.136824 kubelet[2539]: W1213 14:08:27.136820 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.136978 kubelet[2539]: E1213 14:08:27.136896 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.137110 kubelet[2539]: E1213 14:08:27.137077 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.137110 kubelet[2539]: W1213 14:08:27.137094 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.137374 kubelet[2539]: E1213 14:08:27.137262 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.137546 kubelet[2539]: E1213 14:08:27.137522 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.137546 kubelet[2539]: W1213 14:08:27.137539 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.137742 kubelet[2539]: E1213 14:08:27.137647 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.138408 kubelet[2539]: E1213 14:08:27.138383 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.138408 kubelet[2539]: W1213 14:08:27.138406 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.138633 kubelet[2539]: E1213 14:08:27.138539 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.138789 kubelet[2539]: E1213 14:08:27.138770 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.138789 kubelet[2539]: W1213 14:08:27.138786 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.138884 kubelet[2539]: E1213 14:08:27.138878 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.139105 kubelet[2539]: E1213 14:08:27.139085 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.139105 kubelet[2539]: W1213 14:08:27.139099 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.139199 kubelet[2539]: E1213 14:08:27.139182 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.139405 kubelet[2539]: E1213 14:08:27.139386 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.139405 kubelet[2539]: W1213 14:08:27.139400 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.139497 kubelet[2539]: E1213 14:08:27.139488 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.139904 kubelet[2539]: E1213 14:08:27.139885 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.139904 kubelet[2539]: W1213 14:08:27.139900 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.140121 kubelet[2539]: E1213 14:08:27.140030 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.140200 kubelet[2539]: E1213 14:08:27.140167 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.140200 kubelet[2539]: W1213 14:08:27.140182 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.140398 kubelet[2539]: E1213 14:08:27.140293 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.140612 kubelet[2539]: E1213 14:08:27.140452 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.140612 kubelet[2539]: W1213 14:08:27.140465 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.140612 kubelet[2539]: E1213 14:08:27.140542 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.140900 kubelet[2539]: E1213 14:08:27.140879 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.140900 kubelet[2539]: W1213 14:08:27.140898 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.141139 kubelet[2539]: E1213 14:08:27.141019 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.141210 kubelet[2539]: E1213 14:08:27.141154 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.141210 kubelet[2539]: W1213 14:08:27.141161 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.141257 kubelet[2539]: E1213 14:08:27.141233 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.141409 kubelet[2539]: E1213 14:08:27.141393 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.141409 kubelet[2539]: W1213 14:08:27.141405 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.141409 kubelet[2539]: E1213 14:08:27.141479 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.142998 kubelet[2539]: E1213 14:08:27.142819 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.142998 kubelet[2539]: W1213 14:08:27.142837 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.143206 kubelet[2539]: E1213 14:08:27.143132 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.143206 kubelet[2539]: W1213 14:08:27.143145 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.143674 kubelet[2539]: E1213 14:08:27.143645 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.143765 kubelet[2539]: E1213 14:08:27.143706 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.143909 kubelet[2539]: E1213 14:08:27.143877 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.144069 kubelet[2539]: W1213 14:08:27.143959 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.144235 kubelet[2539]: E1213 14:08:27.144129 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.144565 kubelet[2539]: E1213 14:08:27.144515 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.144565 kubelet[2539]: W1213 14:08:27.144531 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.144665 kubelet[2539]: E1213 14:08:27.144577 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.145088 kubelet[2539]: E1213 14:08:27.144982 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.145088 kubelet[2539]: W1213 14:08:27.144994 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.145088 kubelet[2539]: E1213 14:08:27.145031 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.147068 kubelet[2539]: E1213 14:08:27.146878 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.147068 kubelet[2539]: W1213 14:08:27.146893 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.147068 kubelet[2539]: E1213 14:08:27.146979 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.150110 kubelet[2539]: E1213 14:08:27.149953 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.150110 kubelet[2539]: W1213 14:08:27.149976 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.151743 kubelet[2539]: E1213 14:08:27.151706 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.153146 kubelet[2539]: E1213 14:08:27.153081 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.153146 kubelet[2539]: W1213 14:08:27.153099 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.153146 kubelet[2539]: E1213 14:08:27.153116 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.154461 env[1458]: time="2024-12-13T14:08:27.154403798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:27.154610 env[1458]: time="2024-12-13T14:08:27.154588473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:27.154686 env[1458]: time="2024-12-13T14:08:27.154666871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:27.155174 env[1458]: time="2024-12-13T14:08:27.155142576Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd pid=3039 runtime=io.containerd.runc.v2 Dec 13 14:08:27.160099 kubelet[2539]: E1213 14:08:27.160015 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:27.160099 kubelet[2539]: W1213 14:08:27.160036 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:27.160099 kubelet[2539]: E1213 14:08:27.160056 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:27.179324 systemd[1]: Started cri-containerd-1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd.scope. Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit: BPF prog-id=120 op=LOAD Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3039 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653034363366323736396664343730303866383536396538613864 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3039 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653034363366323736396664343730303866383536396538613864 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit: BPF prog-id=121 op=LOAD Dec 13 14:08:27.192000 audit[3050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3039 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653034363366323736396664343730303866383536396538613864 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit: BPF prog-id=122 op=LOAD Dec 13 14:08:27.192000 audit[3050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3039 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653034363366323736396664343730303866383536396538613864 Dec 13 14:08:27.192000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:08:27.192000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { perfmon } for pid=3050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit[3050]: AVC avc: denied { bpf } for pid=3050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.192000 audit: BPF prog-id=123 op=LOAD Dec 13 14:08:27.192000 audit[3050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3039 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162653034363366323736396664343730303866383536396538613864 Dec 13 14:08:27.209402 env[1458]: time="2024-12-13T14:08:27.209351719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-flbql,Uid:b2817bbc-3443-49bd-99b4-34a087f3ba30,Namespace:calico-system,Attempt:0,} returns sandbox id \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\"" Dec 13 14:08:27.580000 audit[3078]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:27.580000 audit[3078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffcc629320 a2=0 a3=1 items=0 ppid=2715 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:27.585000 audit[3078]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:27.585000 audit[3078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcc629320 a2=0 a3=1 items=0 ppid=2715 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:28.527753 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1446417455.mount: Deactivated successfully. Dec 13 14:08:28.895245 kubelet[2539]: E1213 14:08:28.895134 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:29.093740 env[1458]: time="2024-12-13T14:08:29.093676963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:29.100187 env[1458]: time="2024-12-13T14:08:29.100141856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:29.104417 env[1458]: time="2024-12-13T14:08:29.104370294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:29.114208 env[1458]: time="2024-12-13T14:08:29.114166531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:29.114564 env[1458]: time="2024-12-13T14:08:29.114536600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:08:29.123172 env[1458]: time="2024-12-13T14:08:29.123122913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:08:29.129690 env[1458]: time="2024-12-13T14:08:29.129648284Z" level=info msg="CreateContainer within sandbox \"9265b51c8987f1c7240417482e77bd202107a66b04a37faa951df6b03e1fe1a6\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:08:29.169986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount497114017.mount: Deactivated successfully. Dec 13 14:08:29.187755 env[1458]: time="2024-12-13T14:08:29.187699128Z" level=info msg="CreateContainer within sandbox \"9265b51c8987f1c7240417482e77bd202107a66b04a37faa951df6b03e1fe1a6\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"bd733e5d6c0584edf2854d0a870c87211d23d9b26b41ca0cc8e6a747fa4aeab9\"" Dec 13 14:08:29.188592 env[1458]: time="2024-12-13T14:08:29.188565303Z" level=info msg="StartContainer for \"bd733e5d6c0584edf2854d0a870c87211d23d9b26b41ca0cc8e6a747fa4aeab9\"" Dec 13 14:08:29.206744 systemd[1]: Started cri-containerd-bd733e5d6c0584edf2854d0a870c87211d23d9b26b41ca0cc8e6a747fa4aeab9.scope. Dec 13 14:08:29.228497 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:08:29.228616 kernel: audit: type=1400 audit(1734098909.222:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.262401 kernel: audit: type=1400 audit(1734098909.222:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.279533 kernel: audit: type=1400 audit(1734098909.222:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.296980 kernel: audit: type=1400 audit(1734098909.222:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.313770 kernel: audit: type=1400 audit(1734098909.222:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.313882 kernel: audit: type=1400 audit(1734098909.222:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.347892 kernel: audit: type=1400 audit(1734098909.222:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.365241 kernel: audit: type=1400 audit(1734098909.222:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.366766 kernel: audit: type=1400 audit(1734098909.222:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.400143 kernel: audit: type=1400 audit(1734098909.227:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.227000 audit: BPF prog-id=124 op=LOAD Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2971 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373333653564366330353834656466323835346430613837306338 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2971 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373333653564366330353834656466323835346430613837306338 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.229000 audit: BPF prog-id=125 op=LOAD Dec 13 14:08:29.229000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2971 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373333653564366330353834656466323835346430613837306338 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.245000 audit: BPF prog-id=126 op=LOAD Dec 13 14:08:29.245000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2971 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373333653564366330353834656466323835346430613837306338 Dec 13 14:08:29.260000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:08:29.260000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.260000 audit: BPF prog-id=127 op=LOAD Dec 13 14:08:29.260000 audit[3089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2971 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264373333653564366330353834656466323835346430613837306338 Dec 13 14:08:29.407525 env[1458]: time="2024-12-13T14:08:29.407481901Z" level=info msg="StartContainer for \"bd733e5d6c0584edf2854d0a870c87211d23d9b26b41ca0cc8e6a747fa4aeab9\" returns successfully" Dec 13 14:08:29.999665 kubelet[2539]: I1213 14:08:29.999630 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7788cc4b4d-q5fh5" podStartSLOduration=2.008578323 podStartE2EDuration="3.999590204s" podCreationTimestamp="2024-12-13 14:08:26 +0000 UTC" firstStartedPulling="2024-12-13 14:08:27.12384503 +0000 UTC m=+23.342776304" lastFinishedPulling="2024-12-13 14:08:29.114856911 +0000 UTC m=+25.333788185" observedRunningTime="2024-12-13 14:08:29.990891415 +0000 UTC m=+26.209822689" watchObservedRunningTime="2024-12-13 14:08:29.999590204 +0000 UTC m=+26.218521478" Dec 13 14:08:30.053753 kubelet[2539]: E1213 14:08:30.053724 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.053921 kubelet[2539]: W1213 14:08:30.053903 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.053988 kubelet[2539]: E1213 14:08:30.053976 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.054207 kubelet[2539]: E1213 14:08:30.054196 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.054291 kubelet[2539]: W1213 14:08:30.054278 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.054351 kubelet[2539]: E1213 14:08:30.054342 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.054545 kubelet[2539]: E1213 14:08:30.054533 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.054610 kubelet[2539]: W1213 14:08:30.054599 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.054669 kubelet[2539]: E1213 14:08:30.054661 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.054880 kubelet[2539]: E1213 14:08:30.054870 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.054961 kubelet[2539]: W1213 14:08:30.054949 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.055019 kubelet[2539]: E1213 14:08:30.055010 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.055218 kubelet[2539]: E1213 14:08:30.055208 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.055291 kubelet[2539]: W1213 14:08:30.055280 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.055351 kubelet[2539]: E1213 14:08:30.055342 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.055538 kubelet[2539]: E1213 14:08:30.055527 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.055609 kubelet[2539]: W1213 14:08:30.055599 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.055663 kubelet[2539]: E1213 14:08:30.055655 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.055882 kubelet[2539]: E1213 14:08:30.055871 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.055962 kubelet[2539]: W1213 14:08:30.055951 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.056036 kubelet[2539]: E1213 14:08:30.056027 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.056241 kubelet[2539]: E1213 14:08:30.056230 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.056320 kubelet[2539]: W1213 14:08:30.056308 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.056375 kubelet[2539]: E1213 14:08:30.056367 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.056599 kubelet[2539]: E1213 14:08:30.056589 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.056670 kubelet[2539]: W1213 14:08:30.056659 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.056758 kubelet[2539]: E1213 14:08:30.056747 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.057001 kubelet[2539]: E1213 14:08:30.056989 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.057080 kubelet[2539]: W1213 14:08:30.057069 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.057137 kubelet[2539]: E1213 14:08:30.057128 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.057327 kubelet[2539]: E1213 14:08:30.057317 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.057402 kubelet[2539]: W1213 14:08:30.057392 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.057459 kubelet[2539]: E1213 14:08:30.057451 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.057641 kubelet[2539]: E1213 14:08:30.057631 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.057747 kubelet[2539]: W1213 14:08:30.057709 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.057809 kubelet[2539]: E1213 14:08:30.057800 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.058009 kubelet[2539]: E1213 14:08:30.057999 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.058076 kubelet[2539]: W1213 14:08:30.058066 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.058143 kubelet[2539]: E1213 14:08:30.058134 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.058348 kubelet[2539]: E1213 14:08:30.058337 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.058428 kubelet[2539]: W1213 14:08:30.058417 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.058482 kubelet[2539]: E1213 14:08:30.058473 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.058685 kubelet[2539]: E1213 14:08:30.058674 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.058816 kubelet[2539]: W1213 14:08:30.058804 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.058874 kubelet[2539]: E1213 14:08:30.058865 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.070154 kubelet[2539]: E1213 14:08:30.070131 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.070320 kubelet[2539]: W1213 14:08:30.070306 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.070392 kubelet[2539]: E1213 14:08:30.070380 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.070673 kubelet[2539]: E1213 14:08:30.070660 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.070765 kubelet[2539]: W1213 14:08:30.070751 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.070846 kubelet[2539]: E1213 14:08:30.070835 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.071089 kubelet[2539]: E1213 14:08:30.071066 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.071089 kubelet[2539]: W1213 14:08:30.071083 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.071181 kubelet[2539]: E1213 14:08:30.071102 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.071261 kubelet[2539]: E1213 14:08:30.071247 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.071261 kubelet[2539]: W1213 14:08:30.071259 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.071331 kubelet[2539]: E1213 14:08:30.071274 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.071437 kubelet[2539]: E1213 14:08:30.071420 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.071437 kubelet[2539]: W1213 14:08:30.071433 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.071491 kubelet[2539]: E1213 14:08:30.071444 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.071609 kubelet[2539]: E1213 14:08:30.071592 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.071609 kubelet[2539]: W1213 14:08:30.071606 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.071662 kubelet[2539]: E1213 14:08:30.071622 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.071951 kubelet[2539]: E1213 14:08:30.071937 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.072036 kubelet[2539]: W1213 14:08:30.072023 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.072107 kubelet[2539]: E1213 14:08:30.072097 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.072341 kubelet[2539]: E1213 14:08:30.072322 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.072341 kubelet[2539]: W1213 14:08:30.072338 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.072423 kubelet[2539]: E1213 14:08:30.072355 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.072506 kubelet[2539]: E1213 14:08:30.072488 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.072506 kubelet[2539]: W1213 14:08:30.072503 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.072577 kubelet[2539]: E1213 14:08:30.072514 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.072654 kubelet[2539]: E1213 14:08:30.072642 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.072654 kubelet[2539]: W1213 14:08:30.072653 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.072705 kubelet[2539]: E1213 14:08:30.072666 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.072871 kubelet[2539]: E1213 14:08:30.072854 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.072871 kubelet[2539]: W1213 14:08:30.072868 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.072974 kubelet[2539]: E1213 14:08:30.072961 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.073112 kubelet[2539]: E1213 14:08:30.072989 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.073112 kubelet[2539]: W1213 14:08:30.073106 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.073252 kubelet[2539]: E1213 14:08:30.073233 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.073252 kubelet[2539]: W1213 14:08:30.073245 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.073339 kubelet[2539]: E1213 14:08:30.073257 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.073386 kubelet[2539]: E1213 14:08:30.073371 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.073386 kubelet[2539]: W1213 14:08:30.073381 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.073454 kubelet[2539]: E1213 14:08:30.073391 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.073528 kubelet[2539]: E1213 14:08:30.073493 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.073528 kubelet[2539]: W1213 14:08:30.073502 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.073528 kubelet[2539]: E1213 14:08:30.073512 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.073653 kubelet[2539]: E1213 14:08:30.073635 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.073653 kubelet[2539]: W1213 14:08:30.073649 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.073710 kubelet[2539]: E1213 14:08:30.073659 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.073978 kubelet[2539]: E1213 14:08:30.073949 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.074084 kubelet[2539]: E1213 14:08:30.074071 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.074151 kubelet[2539]: W1213 14:08:30.074139 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.074219 kubelet[2539]: E1213 14:08:30.074209 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.074464 kubelet[2539]: E1213 14:08:30.074450 2539 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:30.074538 kubelet[2539]: W1213 14:08:30.074527 2539 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:30.074595 kubelet[2539]: E1213 14:08:30.074587 2539 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:30.747312 env[1458]: time="2024-12-13T14:08:30.747270393Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:30.754792 env[1458]: time="2024-12-13T14:08:30.754753900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:30.763076 env[1458]: time="2024-12-13T14:08:30.763035785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:30.769314 env[1458]: time="2024-12-13T14:08:30.769276728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:30.770068 env[1458]: time="2024-12-13T14:08:30.770039066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:08:30.772325 env[1458]: time="2024-12-13T14:08:30.772270883Z" level=info msg="CreateContainer within sandbox \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:08:30.798386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount713755261.mount: Deactivated successfully. Dec 13 14:08:30.822948 env[1458]: time="2024-12-13T14:08:30.822901444Z" level=info msg="CreateContainer within sandbox \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde\"" Dec 13 14:08:30.826495 env[1458]: time="2024-12-13T14:08:30.826445583Z" level=info msg="StartContainer for \"930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde\"" Dec 13 14:08:30.854328 systemd[1]: Started cri-containerd-930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde.scope. Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3039 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933306438393330393234636330383331323033646536333163376231 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit: BPF prog-id=128 op=LOAD Dec 13 14:08:30.867000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3039 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933306438393330393234636330383331323033646536333163376231 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit: BPF prog-id=129 op=LOAD Dec 13 14:08:30.867000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3039 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933306438393330393234636330383331323033646536333163376231 Dec 13 14:08:30.867000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:08:30.867000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:30.867000 audit: BPF prog-id=130 op=LOAD Dec 13 14:08:30.867000 audit[3158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3039 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933306438393330393234636330383331323033646536333163376231 Dec 13 14:08:30.894064 env[1458]: time="2024-12-13T14:08:30.893848947Z" level=info msg="StartContainer for \"930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde\" returns successfully" Dec 13 14:08:30.896484 kubelet[2539]: E1213 14:08:30.896418 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:30.900067 systemd[1]: cri-containerd-930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde.scope: Deactivated successfully. Dec 13 14:08:30.903000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:08:30.974231 kubelet[2539]: I1213 14:08:30.974200 2539 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:31.119848 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde-rootfs.mount: Deactivated successfully. Dec 13 14:08:31.840023 env[1458]: time="2024-12-13T14:08:31.839966147Z" level=info msg="shim disconnected" id=930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde Dec 13 14:08:31.840411 env[1458]: time="2024-12-13T14:08:31.840390335Z" level=warning msg="cleaning up after shim disconnected" id=930d8930924cc0831203de631c7b16af6eec2099032d7f805571af4e64fc0bde namespace=k8s.io Dec 13 14:08:31.840496 env[1458]: time="2024-12-13T14:08:31.840480773Z" level=info msg="cleaning up dead shim" Dec 13 14:08:31.847971 env[1458]: time="2024-12-13T14:08:31.847929164Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:08:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3204 runtime=io.containerd.runc.v2\n" Dec 13 14:08:31.977728 env[1458]: time="2024-12-13T14:08:31.977678094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:08:32.895826 kubelet[2539]: E1213 14:08:32.895447 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:34.895479 kubelet[2539]: E1213 14:08:34.895348 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:35.479023 env[1458]: time="2024-12-13T14:08:35.478964052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.486403 env[1458]: time="2024-12-13T14:08:35.486352177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.491981 env[1458]: time="2024-12-13T14:08:35.491942390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.497235 env[1458]: time="2024-12-13T14:08:35.497201251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.497824 env[1458]: time="2024-12-13T14:08:35.497790875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:08:35.500164 env[1458]: time="2024-12-13T14:08:35.500133814Z" level=info msg="CreateContainer within sandbox \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:08:35.538626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2909882146.mount: Deactivated successfully. Dec 13 14:08:35.554260 env[1458]: time="2024-12-13T14:08:35.554196549Z" level=info msg="CreateContainer within sandbox \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4\"" Dec 13 14:08:35.554978 env[1458]: time="2024-12-13T14:08:35.554952809Z" level=info msg="StartContainer for \"a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4\"" Dec 13 14:08:35.578407 systemd[1]: Started cri-containerd-a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4.scope. Dec 13 14:08:35.609841 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 14:08:35.609979 kernel: audit: type=1400 audit(1734098915.599:993): avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3039 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.645515 kernel: audit: type=1300 audit(1734098915.599:993): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3039 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.648115 kernel: audit: type=1327 audit(1734098915.599:993): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133363533653837343534643933383434303436626635613862316564 Dec 13 14:08:35.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133363533653837343534643933383434303436626635613862316564 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.686724 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.687887 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.719150 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.720372 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.752848 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.770608 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.770792 kernel: audit: type=1400 audit(1734098915.599:994): avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit: BPF prog-id=131 op=LOAD Dec 13 14:08:35.599000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3039 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133363533653837343534643933383434303436626635613862316564 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit: BPF prog-id=132 op=LOAD Dec 13 14:08:35.599000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3039 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133363533653837343534643933383434303436626635613862316564 Dec 13 14:08:35.599000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:08:35.599000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.599000 audit: BPF prog-id=133 op=LOAD Dec 13 14:08:35.599000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3039 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133363533653837343534643933383434303436626635613862316564 Dec 13 14:08:35.795067 env[1458]: time="2024-12-13T14:08:35.795020363Z" level=info msg="StartContainer for \"a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4\" returns successfully" Dec 13 14:08:36.895146 kubelet[2539]: E1213 14:08:36.895108 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:37.272354 env[1458]: time="2024-12-13T14:08:37.271963739Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:08:37.274155 systemd[1]: cri-containerd-a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4.scope: Deactivated successfully. Dec 13 14:08:37.277000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:08:37.292135 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4-rootfs.mount: Deactivated successfully. Dec 13 14:08:37.325698 kubelet[2539]: I1213 14:08:37.325663 2539 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:08:37.478939 kubelet[2539]: I1213 14:08:37.357762 2539 topology_manager.go:215] "Topology Admit Handler" podUID="987215b8-eed8-4844-889d-860261cd7ad5" podNamespace="kube-system" podName="coredns-76f75df574-pktcl" Dec 13 14:08:37.478939 kubelet[2539]: I1213 14:08:37.370871 2539 topology_manager.go:215] "Topology Admit Handler" podUID="fafe55a3-0ec4-4bf8-9ff7-4261fc98f878" podNamespace="calico-system" podName="calico-kube-controllers-5b47bfc6d6-s8nml" Dec 13 14:08:37.478939 kubelet[2539]: I1213 14:08:37.371024 2539 topology_manager.go:215] "Topology Admit Handler" podUID="e4875b83-de4b-4659-96ef-49a812f321c5" podNamespace="kube-system" podName="coredns-76f75df574-522tj" Dec 13 14:08:37.478939 kubelet[2539]: I1213 14:08:37.373054 2539 topology_manager.go:215] "Topology Admit Handler" podUID="3eb6f562-b18f-47cb-86f6-2895ec700aa3" podNamespace="calico-apiserver" podName="calico-apiserver-58fd6cbc6c-nz797" Dec 13 14:08:37.478939 kubelet[2539]: I1213 14:08:37.373189 2539 topology_manager.go:215] "Topology Admit Handler" podUID="b98e747a-729f-495a-aed8-df51ede6cf32" podNamespace="calico-apiserver" podName="calico-apiserver-58fd6cbc6c-zf8j2" Dec 13 14:08:37.478939 kubelet[2539]: W1213 14:08:37.380120 2539 reflector.go:539] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:37.478939 kubelet[2539]: E1213 14:08:37.380146 2539 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:37.362901 systemd[1]: Created slice kubepods-burstable-pod987215b8_eed8_4844_889d_860261cd7ad5.slice. Dec 13 14:08:37.479356 kubelet[2539]: W1213 14:08:37.380181 2539 reflector.go:539] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:37.479356 kubelet[2539]: E1213 14:08:37.380191 2539 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-52bcbbb462" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.6-a-52bcbbb462' and this object Dec 13 14:08:37.479356 kubelet[2539]: I1213 14:08:37.422949 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltxnd\" (UniqueName: \"kubernetes.io/projected/fafe55a3-0ec4-4bf8-9ff7-4261fc98f878-kube-api-access-ltxnd\") pod \"calico-kube-controllers-5b47bfc6d6-s8nml\" (UID: \"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878\") " pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" Dec 13 14:08:37.479356 kubelet[2539]: I1213 14:08:37.422985 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e4875b83-de4b-4659-96ef-49a812f321c5-config-volume\") pod \"coredns-76f75df574-522tj\" (UID: \"e4875b83-de4b-4659-96ef-49a812f321c5\") " pod="kube-system/coredns-76f75df574-522tj" Dec 13 14:08:37.479356 kubelet[2539]: I1213 14:08:37.423012 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vm7br\" (UniqueName: \"kubernetes.io/projected/987215b8-eed8-4844-889d-860261cd7ad5-kube-api-access-vm7br\") pod \"coredns-76f75df574-pktcl\" (UID: \"987215b8-eed8-4844-889d-860261cd7ad5\") " pod="kube-system/coredns-76f75df574-pktcl" Dec 13 14:08:37.375479 systemd[1]: Created slice kubepods-burstable-pode4875b83_de4b_4659_96ef_49a812f321c5.slice. Dec 13 14:08:37.479529 kubelet[2539]: I1213 14:08:37.423046 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b98e747a-729f-495a-aed8-df51ede6cf32-calico-apiserver-certs\") pod \"calico-apiserver-58fd6cbc6c-zf8j2\" (UID: \"b98e747a-729f-495a-aed8-df51ede6cf32\") " pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" Dec 13 14:08:37.479529 kubelet[2539]: I1213 14:08:37.423069 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fafe55a3-0ec4-4bf8-9ff7-4261fc98f878-tigera-ca-bundle\") pod \"calico-kube-controllers-5b47bfc6d6-s8nml\" (UID: \"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878\") " pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" Dec 13 14:08:37.479529 kubelet[2539]: I1213 14:08:37.423118 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7556j\" (UniqueName: \"kubernetes.io/projected/3eb6f562-b18f-47cb-86f6-2895ec700aa3-kube-api-access-7556j\") pod \"calico-apiserver-58fd6cbc6c-nz797\" (UID: \"3eb6f562-b18f-47cb-86f6-2895ec700aa3\") " pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" Dec 13 14:08:37.479529 kubelet[2539]: I1213 14:08:37.423147 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/987215b8-eed8-4844-889d-860261cd7ad5-config-volume\") pod \"coredns-76f75df574-pktcl\" (UID: \"987215b8-eed8-4844-889d-860261cd7ad5\") " pod="kube-system/coredns-76f75df574-pktcl" Dec 13 14:08:37.479529 kubelet[2539]: I1213 14:08:37.423167 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-59456\" (UniqueName: \"kubernetes.io/projected/b98e747a-729f-495a-aed8-df51ede6cf32-kube-api-access-59456\") pod \"calico-apiserver-58fd6cbc6c-zf8j2\" (UID: \"b98e747a-729f-495a-aed8-df51ede6cf32\") " pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" Dec 13 14:08:37.383903 systemd[1]: Created slice kubepods-besteffort-podb98e747a_729f_495a_aed8_df51ede6cf32.slice. Dec 13 14:08:37.479687 kubelet[2539]: I1213 14:08:37.423210 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3eb6f562-b18f-47cb-86f6-2895ec700aa3-calico-apiserver-certs\") pod \"calico-apiserver-58fd6cbc6c-nz797\" (UID: \"3eb6f562-b18f-47cb-86f6-2895ec700aa3\") " pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" Dec 13 14:08:37.479687 kubelet[2539]: I1213 14:08:37.423233 2539 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vb4lm\" (UniqueName: \"kubernetes.io/projected/e4875b83-de4b-4659-96ef-49a812f321c5-kube-api-access-vb4lm\") pod \"coredns-76f75df574-522tj\" (UID: \"e4875b83-de4b-4659-96ef-49a812f321c5\") " pod="kube-system/coredns-76f75df574-522tj" Dec 13 14:08:37.390057 systemd[1]: Created slice kubepods-besteffort-podfafe55a3_0ec4_4bf8_9ff7_4261fc98f878.slice. Dec 13 14:08:37.394074 systemd[1]: Created slice kubepods-besteffort-pod3eb6f562_b18f_47cb_86f6_2895ec700aa3.slice. Dec 13 14:08:38.130222 env[1458]: time="2024-12-13T14:08:38.128345970Z" level=info msg="shim disconnected" id=a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4 Dec 13 14:08:38.130222 env[1458]: time="2024-12-13T14:08:38.128396769Z" level=warning msg="cleaning up after shim disconnected" id=a3653e87454d93844046bf5a8b1ed91130a8481bdba32c160584bc73bc7712a4 namespace=k8s.io Dec 13 14:08:38.130222 env[1458]: time="2024-12-13T14:08:38.128405489Z" level=info msg="cleaning up dead shim" Dec 13 14:08:38.136118 env[1458]: time="2024-12-13T14:08:38.136071935Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:08:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3273 runtime=io.containerd.runc.v2\n" Dec 13 14:08:38.237001 env[1458]: time="2024-12-13T14:08:38.236952267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-pktcl,Uid:987215b8-eed8-4844-889d-860261cd7ad5,Namespace:kube-system,Attempt:0,}" Dec 13 14:08:38.319996 env[1458]: time="2024-12-13T14:08:38.319920611Z" level=error msg="Failed to destroy network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.322001 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba-shm.mount: Deactivated successfully. Dec 13 14:08:38.323192 env[1458]: time="2024-12-13T14:08:38.323122730Z" level=error msg="encountered an error cleaning up failed sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.323278 env[1458]: time="2024-12-13T14:08:38.323212208Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-pktcl,Uid:987215b8-eed8-4844-889d-860261cd7ad5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.323902 kubelet[2539]: E1213 14:08:38.323465 2539 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.323902 kubelet[2539]: E1213 14:08:38.323521 2539 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-pktcl" Dec 13 14:08:38.323902 kubelet[2539]: E1213 14:08:38.323542 2539 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-pktcl" Dec 13 14:08:38.325675 kubelet[2539]: E1213 14:08:38.323606 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-pktcl_kube-system(987215b8-eed8-4844-889d-860261cd7ad5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-pktcl_kube-system(987215b8-eed8-4844-889d-860261cd7ad5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-pktcl" podUID="987215b8-eed8-4844-889d-860261cd7ad5" Dec 13 14:08:38.414275 env[1458]: time="2024-12-13T14:08:38.414157831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-522tj,Uid:e4875b83-de4b-4659-96ef-49a812f321c5,Namespace:kube-system,Attempt:0,}" Dec 13 14:08:38.421493 env[1458]: time="2024-12-13T14:08:38.421453046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b47bfc6d6-s8nml,Uid:fafe55a3-0ec4-4bf8-9ff7-4261fc98f878,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:38.524404 kubelet[2539]: E1213 14:08:38.524095 2539 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 14:08:38.524404 kubelet[2539]: E1213 14:08:38.524182 2539 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b98e747a-729f-495a-aed8-df51ede6cf32-calico-apiserver-certs podName:b98e747a-729f-495a-aed8-df51ede6cf32 nodeName:}" failed. No retries permitted until 2024-12-13 14:08:39.024162612 +0000 UTC m=+35.243093926 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b98e747a-729f-495a-aed8-df51ede6cf32-calico-apiserver-certs") pod "calico-apiserver-58fd6cbc6c-zf8j2" (UID: "b98e747a-729f-495a-aed8-df51ede6cf32") : failed to sync secret cache: timed out waiting for the condition Dec 13 14:08:38.525975 kubelet[2539]: E1213 14:08:38.525196 2539 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 14:08:38.525975 kubelet[2539]: E1213 14:08:38.525249 2539 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/3eb6f562-b18f-47cb-86f6-2895ec700aa3-calico-apiserver-certs podName:3eb6f562-b18f-47cb-86f6-2895ec700aa3 nodeName:}" failed. No retries permitted until 2024-12-13 14:08:39.025235665 +0000 UTC m=+35.244166939 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/3eb6f562-b18f-47cb-86f6-2895ec700aa3-calico-apiserver-certs") pod "calico-apiserver-58fd6cbc6c-nz797" (UID: "3eb6f562-b18f-47cb-86f6-2895ec700aa3") : failed to sync secret cache: timed out waiting for the condition Dec 13 14:08:38.531765 kubelet[2539]: E1213 14:08:38.531735 2539 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:38.531868 kubelet[2539]: E1213 14:08:38.531771 2539 projected.go:200] Error preparing data for projected volume kube-api-access-59456 for pod calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:38.531868 kubelet[2539]: E1213 14:08:38.531816 2539 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/b98e747a-729f-495a-aed8-df51ede6cf32-kube-api-access-59456 podName:b98e747a-729f-495a-aed8-df51ede6cf32 nodeName:}" failed. No retries permitted until 2024-12-13 14:08:39.031798699 +0000 UTC m=+35.250729973 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-59456" (UniqueName: "kubernetes.io/projected/b98e747a-729f-495a-aed8-df51ede6cf32-kube-api-access-59456") pod "calico-apiserver-58fd6cbc6c-zf8j2" (UID: "b98e747a-729f-495a-aed8-df51ede6cf32") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:38.535268 kubelet[2539]: E1213 14:08:38.534196 2539 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:38.535268 kubelet[2539]: E1213 14:08:38.534222 2539 projected.go:200] Error preparing data for projected volume kube-api-access-7556j for pod calico-apiserver/calico-apiserver-58fd6cbc6c-nz797: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:38.535268 kubelet[2539]: E1213 14:08:38.534259 2539 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/3eb6f562-b18f-47cb-86f6-2895ec700aa3-kube-api-access-7556j podName:3eb6f562-b18f-47cb-86f6-2895ec700aa3 nodeName:}" failed. No retries permitted until 2024-12-13 14:08:39.034246237 +0000 UTC m=+35.253177511 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-7556j" (UniqueName: "kubernetes.io/projected/3eb6f562-b18f-47cb-86f6-2895ec700aa3-kube-api-access-7556j") pod "calico-apiserver-58fd6cbc6c-nz797" (UID: "3eb6f562-b18f-47cb-86f6-2895ec700aa3") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:08:38.555728 env[1458]: time="2024-12-13T14:08:38.555657056Z" level=error msg="Failed to destroy network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.556234 env[1458]: time="2024-12-13T14:08:38.556171243Z" level=error msg="encountered an error cleaning up failed sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.556364 env[1458]: time="2024-12-13T14:08:38.556336519Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-522tj,Uid:e4875b83-de4b-4659-96ef-49a812f321c5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.556748 kubelet[2539]: E1213 14:08:38.556626 2539 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.556748 kubelet[2539]: E1213 14:08:38.556682 2539 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-522tj" Dec 13 14:08:38.556984 kubelet[2539]: E1213 14:08:38.556871 2539 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-522tj" Dec 13 14:08:38.556984 kubelet[2539]: E1213 14:08:38.556958 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-522tj_kube-system(e4875b83-de4b-4659-96ef-49a812f321c5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-522tj_kube-system(e4875b83-de4b-4659-96ef-49a812f321c5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-522tj" podUID="e4875b83-de4b-4659-96ef-49a812f321c5" Dec 13 14:08:38.566324 env[1458]: time="2024-12-13T14:08:38.566276948Z" level=error msg="Failed to destroy network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.566822 env[1458]: time="2024-12-13T14:08:38.566766656Z" level=error msg="encountered an error cleaning up failed sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.566985 env[1458]: time="2024-12-13T14:08:38.566944211Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b47bfc6d6-s8nml,Uid:fafe55a3-0ec4-4bf8-9ff7-4261fc98f878,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.567386 kubelet[2539]: E1213 14:08:38.567352 2539 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.567475 kubelet[2539]: E1213 14:08:38.567411 2539 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" Dec 13 14:08:38.567475 kubelet[2539]: E1213 14:08:38.567440 2539 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" Dec 13 14:08:38.567556 kubelet[2539]: E1213 14:08:38.567487 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5b47bfc6d6-s8nml_calico-system(fafe55a3-0ec4-4bf8-9ff7-4261fc98f878)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5b47bfc6d6-s8nml_calico-system(fafe55a3-0ec4-4bf8-9ff7-4261fc98f878)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" podUID="fafe55a3-0ec4-4bf8-9ff7-4261fc98f878" Dec 13 14:08:38.899686 systemd[1]: Created slice kubepods-besteffort-pode44969a5_2dcd_4477_bb78_5481c7c194d8.slice. Dec 13 14:08:38.902125 env[1458]: time="2024-12-13T14:08:38.902079066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zc9pj,Uid:e44969a5-2dcd-4477-bb78-5481c7c194d8,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:38.991182 kubelet[2539]: I1213 14:08:38.990036 2539 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:08:38.992158 env[1458]: time="2024-12-13T14:08:38.991442529Z" level=info msg="StopPodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\"" Dec 13 14:08:38.993146 kubelet[2539]: I1213 14:08:38.992817 2539 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:08:38.993416 env[1458]: time="2024-12-13T14:08:38.993382280Z" level=info msg="StopPodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\"" Dec 13 14:08:38.996756 kubelet[2539]: I1213 14:08:38.996424 2539 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:08:38.997061 env[1458]: time="2024-12-13T14:08:38.997023668Z" level=info msg="StopPodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\"" Dec 13 14:08:38.998154 env[1458]: time="2024-12-13T14:08:38.998097161Z" level=error msg="Failed to destroy network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.998504 env[1458]: time="2024-12-13T14:08:38.998460472Z" level=error msg="encountered an error cleaning up failed sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.998572 env[1458]: time="2024-12-13T14:08:38.998516830Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zc9pj,Uid:e44969a5-2dcd-4477-bb78-5481c7c194d8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.999143 kubelet[2539]: E1213 14:08:38.998983 2539 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:38.999143 kubelet[2539]: E1213 14:08:38.999021 2539 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:38.999143 kubelet[2539]: E1213 14:08:38.999041 2539 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zc9pj" Dec 13 14:08:38.999287 kubelet[2539]: E1213 14:08:38.999082 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zc9pj_calico-system(e44969a5-2dcd-4477-bb78-5481c7c194d8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zc9pj_calico-system(e44969a5-2dcd-4477-bb78-5481c7c194d8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:39.008749 env[1458]: time="2024-12-13T14:08:39.003778738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:08:39.048775 env[1458]: time="2024-12-13T14:08:39.048701819Z" level=error msg="StopPodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" failed" error="failed to destroy network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.049171 kubelet[2539]: E1213 14:08:39.049142 2539 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:08:39.049246 kubelet[2539]: E1213 14:08:39.049218 2539 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba"} Dec 13 14:08:39.049282 kubelet[2539]: E1213 14:08:39.049259 2539 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"987215b8-eed8-4844-889d-860261cd7ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:39.049337 kubelet[2539]: E1213 14:08:39.049288 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"987215b8-eed8-4844-889d-860261cd7ad5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-pktcl" podUID="987215b8-eed8-4844-889d-860261cd7ad5" Dec 13 14:08:39.063877 env[1458]: time="2024-12-13T14:08:39.063823162Z" level=error msg="StopPodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" failed" error="failed to destroy network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.064255 kubelet[2539]: E1213 14:08:39.064227 2539 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:08:39.064327 kubelet[2539]: E1213 14:08:39.064276 2539 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f"} Dec 13 14:08:39.064327 kubelet[2539]: E1213 14:08:39.064313 2539 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e4875b83-de4b-4659-96ef-49a812f321c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:39.064403 kubelet[2539]: E1213 14:08:39.064343 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e4875b83-de4b-4659-96ef-49a812f321c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-522tj" podUID="e4875b83-de4b-4659-96ef-49a812f321c5" Dec 13 14:08:39.072230 env[1458]: time="2024-12-13T14:08:39.072180594Z" level=error msg="StopPodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" failed" error="failed to destroy network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.072579 kubelet[2539]: E1213 14:08:39.072551 2539 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:08:39.072684 kubelet[2539]: E1213 14:08:39.072598 2539 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c"} Dec 13 14:08:39.072684 kubelet[2539]: E1213 14:08:39.072631 2539 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:39.072684 kubelet[2539]: E1213 14:08:39.072661 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" podUID="fafe55a3-0ec4-4bf8-9ff7-4261fc98f878" Dec 13 14:08:39.295539 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c-shm.mount: Deactivated successfully. Dec 13 14:08:39.295641 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f-shm.mount: Deactivated successfully. Dec 13 14:08:39.314674 env[1458]: time="2024-12-13T14:08:39.314355879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-nz797,Uid:3eb6f562-b18f-47cb-86f6-2895ec700aa3,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:08:39.314674 env[1458]: time="2024-12-13T14:08:39.314540115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-zf8j2,Uid:b98e747a-729f-495a-aed8-df51ede6cf32,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:08:39.451531 env[1458]: time="2024-12-13T14:08:39.451469063Z" level=error msg="Failed to destroy network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.451965 env[1458]: time="2024-12-13T14:08:39.451922252Z" level=error msg="encountered an error cleaning up failed sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.452009 env[1458]: time="2024-12-13T14:08:39.451984290Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-nz797,Uid:3eb6f562-b18f-47cb-86f6-2895ec700aa3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.453311 kubelet[2539]: E1213 14:08:39.452218 2539 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.453311 kubelet[2539]: E1213 14:08:39.452301 2539 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" Dec 13 14:08:39.453311 kubelet[2539]: E1213 14:08:39.452323 2539 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" Dec 13 14:08:39.453672 kubelet[2539]: E1213 14:08:39.452388 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-58fd6cbc6c-nz797_calico-apiserver(3eb6f562-b18f-47cb-86f6-2895ec700aa3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-58fd6cbc6c-nz797_calico-apiserver(3eb6f562-b18f-47cb-86f6-2895ec700aa3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" podUID="3eb6f562-b18f-47cb-86f6-2895ec700aa3" Dec 13 14:08:39.472490 env[1458]: time="2024-12-13T14:08:39.472438980Z" level=error msg="Failed to destroy network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.472971 env[1458]: time="2024-12-13T14:08:39.472938648Z" level=error msg="encountered an error cleaning up failed sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.473093 env[1458]: time="2024-12-13T14:08:39.473067205Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-zf8j2,Uid:b98e747a-729f-495a-aed8-df51ede6cf32,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.474345 kubelet[2539]: E1213 14:08:39.473387 2539 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:39.474345 kubelet[2539]: E1213 14:08:39.473435 2539 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" Dec 13 14:08:39.474345 kubelet[2539]: E1213 14:08:39.473455 2539 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" Dec 13 14:08:39.475311 kubelet[2539]: E1213 14:08:39.474627 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-58fd6cbc6c-zf8j2_calico-apiserver(b98e747a-729f-495a-aed8-df51ede6cf32)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-58fd6cbc6c-zf8j2_calico-apiserver(b98e747a-729f-495a-aed8-df51ede6cf32)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" podUID="b98e747a-729f-495a-aed8-df51ede6cf32" Dec 13 14:08:40.001529 kubelet[2539]: I1213 14:08:40.001490 2539 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:08:40.002240 env[1458]: time="2024-12-13T14:08:40.002190221Z" level=info msg="StopPodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\"" Dec 13 14:08:40.003655 kubelet[2539]: I1213 14:08:40.003594 2539 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:08:40.004117 env[1458]: time="2024-12-13T14:08:40.004091814Z" level=info msg="StopPodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\"" Dec 13 14:08:40.006026 kubelet[2539]: I1213 14:08:40.006001 2539 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:08:40.006460 env[1458]: time="2024-12-13T14:08:40.006424637Z" level=info msg="StopPodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\"" Dec 13 14:08:40.049944 env[1458]: time="2024-12-13T14:08:40.049884528Z" level=error msg="StopPodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" failed" error="failed to destroy network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:40.050513 kubelet[2539]: E1213 14:08:40.050380 2539 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:08:40.050513 kubelet[2539]: E1213 14:08:40.050425 2539 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce"} Dec 13 14:08:40.050513 kubelet[2539]: E1213 14:08:40.050465 2539 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3eb6f562-b18f-47cb-86f6-2895ec700aa3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:40.050513 kubelet[2539]: E1213 14:08:40.050492 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3eb6f562-b18f-47cb-86f6-2895ec700aa3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" podUID="3eb6f562-b18f-47cb-86f6-2895ec700aa3" Dec 13 14:08:40.053482 env[1458]: time="2024-12-13T14:08:40.053434721Z" level=error msg="StopPodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" failed" error="failed to destroy network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:40.054027 kubelet[2539]: E1213 14:08:40.054002 2539 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:08:40.054113 kubelet[2539]: E1213 14:08:40.054055 2539 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7"} Dec 13 14:08:40.054113 kubelet[2539]: E1213 14:08:40.054089 2539 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e44969a5-2dcd-4477-bb78-5481c7c194d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:40.054199 kubelet[2539]: E1213 14:08:40.054144 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e44969a5-2dcd-4477-bb78-5481c7c194d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zc9pj" podUID="e44969a5-2dcd-4477-bb78-5481c7c194d8" Dec 13 14:08:40.056430 env[1458]: time="2024-12-13T14:08:40.056385728Z" level=error msg="StopPodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" failed" error="failed to destroy network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:40.056756 kubelet[2539]: E1213 14:08:40.056732 2539 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:08:40.056830 kubelet[2539]: E1213 14:08:40.056770 2539 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e"} Dec 13 14:08:40.056830 kubelet[2539]: E1213 14:08:40.056812 2539 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b98e747a-729f-495a-aed8-df51ede6cf32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:40.056902 kubelet[2539]: E1213 14:08:40.056844 2539 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b98e747a-729f-495a-aed8-df51ede6cf32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" podUID="b98e747a-729f-495a-aed8-df51ede6cf32" Dec 13 14:08:40.293003 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e-shm.mount: Deactivated successfully. Dec 13 14:08:40.293820 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce-shm.mount: Deactivated successfully. Dec 13 14:08:44.085707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2162221151.mount: Deactivated successfully. Dec 13 14:08:44.348442 env[1458]: time="2024-12-13T14:08:44.348330194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:44.354041 env[1458]: time="2024-12-13T14:08:44.354012622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:44.357655 env[1458]: time="2024-12-13T14:08:44.357617617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:44.363373 env[1458]: time="2024-12-13T14:08:44.363344164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:44.363863 env[1458]: time="2024-12-13T14:08:44.363837752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:08:44.377997 env[1458]: time="2024-12-13T14:08:44.373315971Z" level=info msg="CreateContainer within sandbox \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:08:44.404474 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1301370985.mount: Deactivated successfully. Dec 13 14:08:44.418504 env[1458]: time="2024-12-13T14:08:44.418458156Z" level=info msg="CreateContainer within sandbox \"1be0463f2769fd47008f8569e8a8d9ec75f1764d52515a663ba09a82971598cd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d\"" Dec 13 14:08:44.420527 env[1458]: time="2024-12-13T14:08:44.420420390Z" level=info msg="StartContainer for \"2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d\"" Dec 13 14:08:44.434847 systemd[1]: Started cri-containerd-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d.scope. Dec 13 14:08:44.471829 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:08:44.471949 kernel: audit: type=1400 audit(1734098924.450:1000): avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.450000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.450000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3039 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:44.496785 kernel: audit: type=1300 audit(1734098924.450:1000): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3039 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:44.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262616630646164383738656631626463323364633862613464356665 Dec 13 14:08:44.519722 kernel: audit: type=1327 audit(1734098924.450:1000): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262616630646164383738656631626463323364633862613464356665 Dec 13 14:08:44.520778 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.553452 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.570372 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.573920 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.587000 env[1458]: time="2024-12-13T14:08:44.586951100Z" level=info msg="StartContainer for \"2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d\" returns successfully" Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.603371 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.620277 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.636958 kernel: audit: type=1400 audit(1734098924.469:1001): avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.469000 audit: BPF prog-id=134 op=LOAD Dec 13 14:08:44.469000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3039 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:44.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262616630646164383738656631626463323364633862613464356665 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit: BPF prog-id=135 op=LOAD Dec 13 14:08:44.471000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3039 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:44.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262616630646164383738656631626463323364633862613464356665 Dec 13 14:08:44.471000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:08:44.471000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:44.471000 audit: BPF prog-id=136 op=LOAD Dec 13 14:08:44.471000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3039 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:44.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262616630646164383738656631626463323364633862613464356665 Dec 13 14:08:44.940139 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:08:44.940253 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:08:45.032972 kubelet[2539]: I1213 14:08:45.032925 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-flbql" podStartSLOduration=1.881082175 podStartE2EDuration="19.03288253s" podCreationTimestamp="2024-12-13 14:08:26 +0000 UTC" firstStartedPulling="2024-12-13 14:08:27.212317871 +0000 UTC m=+23.431249145" lastFinishedPulling="2024-12-13 14:08:44.364118266 +0000 UTC m=+40.583049500" observedRunningTime="2024-12-13 14:08:45.031789356 +0000 UTC m=+41.250720630" watchObservedRunningTime="2024-12-13 14:08:45.03288253 +0000 UTC m=+41.251813764" Dec 13 14:08:46.415000 audit[3709]: AVC avc: denied { write } for pid=3709 comm="tee" name="fd" dev="proc" ino=24440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.423000 audit[3727]: AVC avc: denied { write } for pid=3727 comm="tee" name="fd" dev="proc" ino=24446 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.415000 audit[3709]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffebf18a10 a2=241 a3=1b6 items=1 ppid=3679 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.415000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:08:46.415000 audit: PATH item=0 name="/dev/fd/63" inode=24423 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.425000 audit[3722]: AVC avc: denied { write } for pid=3722 comm="tee" name="fd" dev="proc" ino=24450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.415000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:46.429000 audit[3717]: AVC avc: denied { write } for pid=3717 comm="tee" name="fd" dev="proc" ino=24453 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.429000 audit[3717]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8edfa12 a2=241 a3=1b6 items=1 ppid=3682 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.429000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:08:46.429000 audit: PATH item=0 name="/dev/fd/63" inode=24432 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.429000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:46.423000 audit[3727]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6eb3a11 a2=241 a3=1b6 items=1 ppid=3680 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.425000 audit[3722]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1ec0a10 a2=241 a3=1b6 items=1 ppid=3673 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.423000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:08:46.425000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:08:46.423000 audit: PATH item=0 name="/dev/fd/63" inode=24437 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.425000 audit: PATH item=0 name="/dev/fd/63" inode=24978 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:46.425000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:46.444000 audit[3744]: AVC avc: denied { write } for pid=3744 comm="tee" name="fd" dev="proc" ino=24471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.445000 audit[3732]: AVC avc: denied { write } for pid=3732 comm="tee" name="fd" dev="proc" ino=24474 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.451000 audit[3747]: AVC avc: denied { write } for pid=3747 comm="tee" name="fd" dev="proc" ino=24477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:46.444000 audit[3744]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcbd8ea10 a2=241 a3=1b6 items=1 ppid=3681 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.444000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:08:46.444000 audit: PATH item=0 name="/dev/fd/63" inode=24458 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.444000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:46.445000 audit[3732]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb407a01 a2=241 a3=1b6 items=1 ppid=3683 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.445000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:08:46.445000 audit: PATH item=0 name="/dev/fd/63" inode=24441 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:46.451000 audit[3747]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff38dda00 a2=241 a3=1b6 items=1 ppid=3675 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:46.451000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:08:46.451000 audit: PATH item=0 name="/dev/fd/63" inode=24985 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:46.451000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:47.880140 kubelet[2539]: I1213 14:08:47.880099 2539 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:47.958388 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.vmEE0V.mount: Deactivated successfully. Dec 13 14:08:49.895750 env[1458]: time="2024-12-13T14:08:49.895693678Z" level=info msg="StopPodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\"" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.940 [INFO][3882] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.941 [INFO][3882] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" iface="eth0" netns="/var/run/netns/cni-58db9a61-9ac4-5a7a-7255-810fdee0113e" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.941 [INFO][3882] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" iface="eth0" netns="/var/run/netns/cni-58db9a61-9ac4-5a7a-7255-810fdee0113e" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.941 [INFO][3882] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" iface="eth0" netns="/var/run/netns/cni-58db9a61-9ac4-5a7a-7255-810fdee0113e" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.941 [INFO][3882] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.941 [INFO][3882] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.959 [INFO][3889] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.959 [INFO][3889] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.959 [INFO][3889] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.973 [WARNING][3889] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.973 [INFO][3889] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.975 [INFO][3889] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:49.979332 env[1458]: 2024-12-13 14:08:49.977 [INFO][3882] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:08:49.981553 systemd[1]: run-netns-cni\x2d58db9a61\x2d9ac4\x2d5a7a\x2d7255\x2d810fdee0113e.mount: Deactivated successfully. Dec 13 14:08:49.984651 env[1458]: time="2024-12-13T14:08:49.982626323Z" level=info msg="TearDown network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" successfully" Dec 13 14:08:49.984651 env[1458]: time="2024-12-13T14:08:49.982667202Z" level=info msg="StopPodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" returns successfully" Dec 13 14:08:49.985413 env[1458]: time="2024-12-13T14:08:49.985386262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b47bfc6d6-s8nml,Uid:fafe55a3-0ec4-4bf8-9ff7-4261fc98f878,Namespace:calico-system,Attempt:1,}" Dec 13 14:08:50.139037 systemd-networkd[1616]: cali69ddccb4018: Link UP Dec 13 14:08:50.154432 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:50.154554 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali69ddccb4018: link becomes ready Dec 13 14:08:50.155431 systemd-networkd[1616]: cali69ddccb4018: Gained carrier Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.055 [INFO][3896] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.068 [INFO][3896] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0 calico-kube-controllers-5b47bfc6d6- calico-system fafe55a3-0ec4-4bf8-9ff7-4261fc98f878 746 0 2024-12-13 14:08:27 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5b47bfc6d6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-52bcbbb462 calico-kube-controllers-5b47bfc6d6-s8nml eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali69ddccb4018 [] []}} ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.068 [INFO][3896] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.091 [INFO][3908] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" HandleID="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.102 [INFO][3908] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" HandleID="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316ad0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-52bcbbb462", "pod":"calico-kube-controllers-5b47bfc6d6-s8nml", "timestamp":"2024-12-13 14:08:50.091969735 +0000 UTC"}, Hostname:"ci-3510.3.6-a-52bcbbb462", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.103 [INFO][3908] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.103 [INFO][3908] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.103 [INFO][3908] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-52bcbbb462' Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.104 [INFO][3908] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.107 [INFO][3908] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.110 [INFO][3908] ipam/ipam.go 489: Trying affinity for 192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.112 [INFO][3908] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.113 [INFO][3908] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.113 [INFO][3908] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.128/26 handle="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.115 [INFO][3908] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.119 [INFO][3908] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.128/26 handle="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.125 [INFO][3908] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.129/26] block=192.168.5.128/26 handle="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.125 [INFO][3908] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.129/26] handle="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.125 [INFO][3908] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.173880 env[1458]: 2024-12-13 14:08:50.125 [INFO][3908] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.129/26] IPv6=[] ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" HandleID="k8s-pod-network.58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.174678 env[1458]: 2024-12-13 14:08:50.127 [INFO][3896] cni-plugin/k8s.go 386: Populated endpoint ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0", GenerateName:"calico-kube-controllers-5b47bfc6d6-", Namespace:"calico-system", SelfLink:"", UID:"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b47bfc6d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"", Pod:"calico-kube-controllers-5b47bfc6d6-s8nml", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69ddccb4018", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.174678 env[1458]: 2024-12-13 14:08:50.127 [INFO][3896] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.129/32] ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.174678 env[1458]: 2024-12-13 14:08:50.127 [INFO][3896] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali69ddccb4018 ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.174678 env[1458]: 2024-12-13 14:08:50.155 [INFO][3896] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.174678 env[1458]: 2024-12-13 14:08:50.157 [INFO][3896] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0", GenerateName:"calico-kube-controllers-5b47bfc6d6-", Namespace:"calico-system", SelfLink:"", UID:"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b47bfc6d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee", Pod:"calico-kube-controllers-5b47bfc6d6-s8nml", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69ddccb4018", MAC:"06:a3:eb:7c:a3:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.174678 env[1458]: 2024-12-13 14:08:50.171 [INFO][3896] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee" Namespace="calico-system" Pod="calico-kube-controllers-5b47bfc6d6-s8nml" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:08:50.188395 env[1458]: time="2024-12-13T14:08:50.188314155Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:50.188395 env[1458]: time="2024-12-13T14:08:50.188355154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:50.188395 env[1458]: time="2024-12-13T14:08:50.188365994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:50.188858 env[1458]: time="2024-12-13T14:08:50.188799545Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee pid=3935 runtime=io.containerd.runc.v2 Dec 13 14:08:50.204675 systemd[1]: Started cri-containerd-58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee.scope. Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.228450 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:08:50.228575 kernel: audit: type=1400 audit(1734098930.221:1013): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.261488 kernel: audit: type=1400 audit(1734098930.221:1014): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.261598 kernel: audit: type=1400 audit(1734098930.221:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.294387 kernel: audit: type=1400 audit(1734098930.221:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.294765 kernel: audit: type=1400 audit(1734098930.221:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.326905 kernel: audit: type=1400 audit(1734098930.221:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.327042 kernel: audit: type=1400 audit(1734098930.221:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.359928 kernel: audit: type=1400 audit(1734098930.221:1020): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.376328 kernel: audit: type=1400 audit(1734098930.221:1021): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.393057 kernel: audit: type=1400 audit(1734098930.221:1022): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.221000 audit: BPF prog-id=137 op=LOAD Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3935 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:50.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538656231666262383564383665323633393266666261313564353638 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3935 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:50.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538656231666262383564383665323633393266666261313564353638 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.225000 audit: BPF prog-id=138 op=LOAD Dec 13 14:08:50.225000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3935 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:50.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538656231666262383564383665323633393266666261313564353638 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.226000 audit: BPF prog-id=139 op=LOAD Dec 13 14:08:50.226000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3935 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:50.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538656231666262383564383665323633393266666261313564353638 Dec 13 14:08:50.243000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:08:50.243000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:50.243000 audit: BPF prog-id=140 op=LOAD Dec 13 14:08:50.243000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3935 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:50.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538656231666262383564383665323633393266666261313564353638 Dec 13 14:08:50.397106 env[1458]: time="2024-12-13T14:08:50.397067885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b47bfc6d6-s8nml,Uid:fafe55a3-0ec4-4bf8-9ff7-4261fc98f878,Namespace:calico-system,Attempt:1,} returns sandbox id \"58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee\"" Dec 13 14:08:50.400704 env[1458]: time="2024-12-13T14:08:50.400582489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:08:50.896382 env[1458]: time="2024-12-13T14:08:50.895664059Z" level=info msg="StopPodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\"" Dec 13 14:08:50.896681 env[1458]: time="2024-12-13T14:08:50.896584039Z" level=info msg="StopPodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\"" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.962 [INFO][4016] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.963 [INFO][4016] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" iface="eth0" netns="/var/run/netns/cni-afbc537a-281e-558c-1a2a-852ea28969df" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.963 [INFO][4016] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" iface="eth0" netns="/var/run/netns/cni-afbc537a-281e-558c-1a2a-852ea28969df" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.963 [INFO][4016] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" iface="eth0" netns="/var/run/netns/cni-afbc537a-281e-558c-1a2a-852ea28969df" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.963 [INFO][4016] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.963 [INFO][4016] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.992 [INFO][4033] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.993 [INFO][4033] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:50.993 [INFO][4033] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:51.008 [WARNING][4033] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:51.008 [INFO][4033] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:51.010 [INFO][4033] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:51.014827 env[1458]: 2024-12-13 14:08:51.011 [INFO][4016] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:08:51.017550 systemd[1]: run-netns-cni\x2dafbc537a\x2d281e\x2d558c\x2d1a2a\x2d852ea28969df.mount: Deactivated successfully. Dec 13 14:08:51.018849 env[1458]: time="2024-12-13T14:08:51.018789659Z" level=info msg="TearDown network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" successfully" Dec 13 14:08:51.019019 env[1458]: time="2024-12-13T14:08:51.018996495Z" level=info msg="StopPodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" returns successfully" Dec 13 14:08:51.020100 env[1458]: time="2024-12-13T14:08:51.020056352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-pktcl,Uid:987215b8-eed8-4844-889d-860261cd7ad5,Namespace:kube-system,Attempt:1,}" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.968 [INFO][4025] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.968 [INFO][4025] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" iface="eth0" netns="/var/run/netns/cni-55841091-2030-d90f-fe23-ab93d9115970" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.969 [INFO][4025] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" iface="eth0" netns="/var/run/netns/cni-55841091-2030-d90f-fe23-ab93d9115970" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.972 [INFO][4025] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" iface="eth0" netns="/var/run/netns/cni-55841091-2030-d90f-fe23-ab93d9115970" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.973 [INFO][4025] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.973 [INFO][4025] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.998 [INFO][4037] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:50.999 [INFO][4037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:51.009 [INFO][4037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:51.027 [WARNING][4037] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:51.028 [INFO][4037] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:51.036 [INFO][4037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:51.039219 env[1458]: 2024-12-13 14:08:51.037 [INFO][4025] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:08:51.041812 systemd[1]: run-netns-cni\x2d55841091\x2d2030\x2dd90f\x2dfe23\x2dab93d9115970.mount: Deactivated successfully. Dec 13 14:08:51.043375 env[1458]: time="2024-12-13T14:08:51.043342730Z" level=info msg="TearDown network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" successfully" Dec 13 14:08:51.043470 env[1458]: time="2024-12-13T14:08:51.043453567Z" level=info msg="StopPodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" returns successfully" Dec 13 14:08:51.044094 env[1458]: time="2024-12-13T14:08:51.044068994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-522tj,Uid:e4875b83-de4b-4659-96ef-49a812f321c5,Namespace:kube-system,Attempt:1,}" Dec 13 14:08:51.249480 systemd-networkd[1616]: cali5f5b62c8f1a: Link UP Dec 13 14:08:51.264968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:51.265053 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5f5b62c8f1a: link becomes ready Dec 13 14:08:51.266343 systemd-networkd[1616]: cali5f5b62c8f1a: Gained carrier Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.129 [INFO][4046] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.144 [INFO][4046] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0 coredns-76f75df574- kube-system 987215b8-eed8-4844-889d-860261cd7ad5 754 0 2024-12-13 14:08:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-52bcbbb462 coredns-76f75df574-pktcl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5f5b62c8f1a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.145 [INFO][4046] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.186 [INFO][4071] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" HandleID="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.206 [INFO][4071] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" HandleID="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011afd0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-52bcbbb462", "pod":"coredns-76f75df574-pktcl", "timestamp":"2024-12-13 14:08:51.186956713 +0000 UTC"}, Hostname:"ci-3510.3.6-a-52bcbbb462", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.207 [INFO][4071] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.207 [INFO][4071] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.207 [INFO][4071] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-52bcbbb462' Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.209 [INFO][4071] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.214 [INFO][4071] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.217 [INFO][4071] ipam/ipam.go 489: Trying affinity for 192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.219 [INFO][4071] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.221 [INFO][4071] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.222 [INFO][4071] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.128/26 handle="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.224 [INFO][4071] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893 Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.228 [INFO][4071] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.128/26 handle="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.244 [INFO][4071] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.130/26] block=192.168.5.128/26 handle="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.244 [INFO][4071] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.130/26] handle="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.244 [INFO][4071] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:51.288407 env[1458]: 2024-12-13 14:08:51.244 [INFO][4071] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.130/26] IPv6=[] ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" HandleID="k8s-pod-network.047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.289081 env[1458]: 2024-12-13 14:08:51.245 [INFO][4046] cni-plugin/k8s.go 386: Populated endpoint ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"987215b8-eed8-4844-889d-860261cd7ad5", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"", Pod:"coredns-76f75df574-pktcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f5b62c8f1a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:51.289081 env[1458]: 2024-12-13 14:08:51.246 [INFO][4046] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.130/32] ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.289081 env[1458]: 2024-12-13 14:08:51.246 [INFO][4046] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5f5b62c8f1a ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.289081 env[1458]: 2024-12-13 14:08:51.268 [INFO][4046] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.289081 env[1458]: 2024-12-13 14:08:51.270 [INFO][4046] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"987215b8-eed8-4844-889d-860261cd7ad5", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893", Pod:"coredns-76f75df574-pktcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f5b62c8f1a", MAC:"9a:7b:33:61:41:ce", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:51.289081 env[1458]: 2024-12-13 14:08:51.284 [INFO][4046] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893" Namespace="kube-system" Pod="coredns-76f75df574-pktcl" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:08:51.312796 env[1458]: time="2024-12-13T14:08:51.312657363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:51.312796 env[1458]: time="2024-12-13T14:08:51.312700322Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:51.312796 env[1458]: time="2024-12-13T14:08:51.312719722Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:51.313306 env[1458]: time="2024-12-13T14:08:51.313256190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893 pid=4104 runtime=io.containerd.runc.v2 Dec 13 14:08:51.322901 systemd-networkd[1616]: calibdb350ced7f: Link UP Dec 13 14:08:51.331002 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibdb350ced7f: link becomes ready Dec 13 14:08:51.330628 systemd-networkd[1616]: calibdb350ced7f: Gained carrier Dec 13 14:08:51.332547 systemd[1]: Started cri-containerd-047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893.scope. Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.347000 audit: BPF prog-id=141 op=LOAD Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373636396265333333643934613563393530393435316463646532 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373636396265333333643934613563393530393435316463646532 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit: BPF prog-id=142 op=LOAD Dec 13 14:08:51.348000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373636396265333333643934613563393530393435316463646532 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit: BPF prog-id=143 op=LOAD Dec 13 14:08:51.348000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373636396265333333643934613563393530393435316463646532 Dec 13 14:08:51.348000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:08:51.348000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.348000 audit: BPF prog-id=144 op=LOAD Dec 13 14:08:51.348000 audit[4114]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034373636396265333333643934613563393530393435316463646532 Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.159 [INFO][4059] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.174 [INFO][4059] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0 coredns-76f75df574- kube-system e4875b83-de4b-4659-96ef-49a812f321c5 755 0 2024-12-13 14:08:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-52bcbbb462 coredns-76f75df574-522tj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibdb350ced7f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.174 [INFO][4059] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.236 [INFO][4078] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" HandleID="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.266 [INFO][4078] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" HandleID="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003167d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-52bcbbb462", "pod":"coredns-76f75df574-522tj", "timestamp":"2024-12-13 14:08:51.236015615 +0000 UTC"}, Hostname:"ci-3510.3.6-a-52bcbbb462", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.266 [INFO][4078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.266 [INFO][4078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.266 [INFO][4078] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-52bcbbb462' Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.270 [INFO][4078] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.288 [INFO][4078] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.294 [INFO][4078] ipam/ipam.go 489: Trying affinity for 192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.296 [INFO][4078] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.299 [INFO][4078] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.299 [INFO][4078] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.128/26 handle="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.302 [INFO][4078] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.308 [INFO][4078] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.128/26 handle="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.317 [INFO][4078] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.131/26] block=192.168.5.128/26 handle="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.317 [INFO][4078] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.131/26] handle="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.317 [INFO][4078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:51.356058 env[1458]: 2024-12-13 14:08:51.317 [INFO][4078] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.131/26] IPv6=[] ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" HandleID="k8s-pod-network.ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.356636 env[1458]: 2024-12-13 14:08:51.319 [INFO][4059] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e4875b83-de4b-4659-96ef-49a812f321c5", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"", Pod:"coredns-76f75df574-522tj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb350ced7f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:51.356636 env[1458]: 2024-12-13 14:08:51.320 [INFO][4059] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.131/32] ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.356636 env[1458]: 2024-12-13 14:08:51.320 [INFO][4059] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibdb350ced7f ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.356636 env[1458]: 2024-12-13 14:08:51.331 [INFO][4059] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.356636 env[1458]: 2024-12-13 14:08:51.338 [INFO][4059] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e4875b83-de4b-4659-96ef-49a812f321c5", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da", Pod:"coredns-76f75df574-522tj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb350ced7f", MAC:"0e:53:47:05:ed:43", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:51.356636 env[1458]: 2024-12-13 14:08:51.353 [INFO][4059] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da" Namespace="kube-system" Pod="coredns-76f75df574-522tj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:08:51.376211 env[1458]: time="2024-12-13T14:08:51.376165354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-pktcl,Uid:987215b8-eed8-4844-889d-860261cd7ad5,Namespace:kube-system,Attempt:1,} returns sandbox id \"047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893\"" Dec 13 14:08:51.380091 env[1458]: time="2024-12-13T14:08:51.380053470Z" level=info msg="CreateContainer within sandbox \"047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:08:51.381058 env[1458]: time="2024-12-13T14:08:51.380850773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:51.381058 env[1458]: time="2024-12-13T14:08:51.380890132Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:51.381058 env[1458]: time="2024-12-13T14:08:51.380899892Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:51.382266 env[1458]: time="2024-12-13T14:08:51.381805952Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da pid=4153 runtime=io.containerd.runc.v2 Dec 13 14:08:51.394341 systemd[1]: Started cri-containerd-ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da.scope. Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.406000 audit: BPF prog-id=145 op=LOAD Dec 13 14:08:51.407000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.407000 audit[4165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4153 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303735613130353964396434373163323635323933663537373665 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4153 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303735613130353964396434373163323635323933663537373665 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.408000 audit: BPF prog-id=146 op=LOAD Dec 13 14:08:51.408000 audit[4165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4153 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303735613130353964396434373163323635323933663537373665 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.409000 audit: BPF prog-id=147 op=LOAD Dec 13 14:08:51.409000 audit[4165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4153 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303735613130353964396434373163323635323933663537373665 Dec 13 14:08:51.410000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:08:51.410000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { perfmon } for pid=4165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit[4165]: AVC avc: denied { bpf } for pid=4165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.410000 audit: BPF prog-id=148 op=LOAD Dec 13 14:08:51.410000 audit[4165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4153 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303735613130353964396434373163323635323933663537373665 Dec 13 14:08:51.429513 env[1458]: time="2024-12-13T14:08:51.429144891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-522tj,Uid:e4875b83-de4b-4659-96ef-49a812f321c5,Namespace:kube-system,Attempt:1,} returns sandbox id \"ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da\"" Dec 13 14:08:51.434013 env[1458]: time="2024-12-13T14:08:51.433970667Z" level=info msg="CreateContainer within sandbox \"ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:08:51.438452 env[1458]: time="2024-12-13T14:08:51.438404492Z" level=info msg="CreateContainer within sandbox \"047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f5d78c78ab0f66d81861a91b69f07b6ff34fb818510685f122d27fef5b801522\"" Dec 13 14:08:51.438855 env[1458]: time="2024-12-13T14:08:51.438831802Z" level=info msg="StartContainer for \"f5d78c78ab0f66d81861a91b69f07b6ff34fb818510685f122d27fef5b801522\"" Dec 13 14:08:51.458955 systemd[1]: Started cri-containerd-f5d78c78ab0f66d81861a91b69f07b6ff34fb818510685f122d27fef5b801522.scope. Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.475000 audit: BPF prog-id=149 op=LOAD Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4104 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643738633738616230663636643831383631613931623639663037 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4104 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643738633738616230663636643831383631613931623639663037 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit: BPF prog-id=150 op=LOAD Dec 13 14:08:51.476000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4104 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643738633738616230663636643831383631613931623639663037 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit: BPF prog-id=151 op=LOAD Dec 13 14:08:51.476000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4104 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643738633738616230663636643831383631613931623639663037 Dec 13 14:08:51.476000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:08:51.476000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.476000 audit: BPF prog-id=152 op=LOAD Dec 13 14:08:51.476000 audit[4197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4104 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643738633738616230663636643831383631613931623639663037 Dec 13 14:08:51.483790 env[1458]: time="2024-12-13T14:08:51.483687315Z" level=info msg="CreateContainer within sandbox \"ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a0bd2cce518ef2d5cb8ab2630c62a108904220644b3108e7d395934456d14dbb\"" Dec 13 14:08:51.487221 env[1458]: time="2024-12-13T14:08:51.484637295Z" level=info msg="StartContainer for \"a0bd2cce518ef2d5cb8ab2630c62a108904220644b3108e7d395934456d14dbb\"" Dec 13 14:08:51.506046 env[1458]: time="2024-12-13T14:08:51.505959755Z" level=info msg="StartContainer for \"f5d78c78ab0f66d81861a91b69f07b6ff34fb818510685f122d27fef5b801522\" returns successfully" Dec 13 14:08:51.524612 systemd[1]: Started cri-containerd-a0bd2cce518ef2d5cb8ab2630c62a108904220644b3108e7d395934456d14dbb.scope. Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.558000 audit: BPF prog-id=153 op=LOAD Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4153 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130626432636365353138656632643563623861623236333063363261 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4153 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130626432636365353138656632643563623861623236333063363261 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit: BPF prog-id=154 op=LOAD Dec 13 14:08:51.559000 audit[4233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4153 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130626432636365353138656632643563623861623236333063363261 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit: BPF prog-id=155 op=LOAD Dec 13 14:08:51.559000 audit[4233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4153 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130626432636365353138656632643563623861623236333063363261 Dec 13 14:08:51.559000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:08:51.559000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:51.559000 audit: BPF prog-id=156 op=LOAD Dec 13 14:08:51.559000 audit[4233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4153 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:51.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130626432636365353138656632643563623861623236333063363261 Dec 13 14:08:51.598622 env[1458]: time="2024-12-13T14:08:51.598550159Z" level=info msg="StartContainer for \"a0bd2cce518ef2d5cb8ab2630c62a108904220644b3108e7d395934456d14dbb\" returns successfully" Dec 13 14:08:51.901795 env[1458]: time="2024-12-13T14:08:51.899808063Z" level=info msg="StopPodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\"" Dec 13 14:08:51.925923 env[1458]: time="2024-12-13T14:08:51.925877941Z" level=info msg="StopPodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\"" Dec 13 14:08:52.072608 kubelet[2539]: I1213 14:08:52.072566 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-522tj" podStartSLOduration=33.072513115 podStartE2EDuration="33.072513115s" podCreationTimestamp="2024-12-13 14:08:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:52.051332527 +0000 UTC m=+48.270263801" watchObservedRunningTime="2024-12-13 14:08:52.072513115 +0000 UTC m=+48.291444389" Dec 13 14:08:52.096000 audit[4334]: NETFILTER_CFG table=filter:99 family=2 entries=18 op=nft_register_rule pid=4334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:52.096000 audit[4334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffe1781980 a2=0 a3=1 items=0 ppid=2715 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:52.123438 kubelet[2539]: I1213 14:08:52.122859 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-pktcl" podStartSLOduration=33.122818842 podStartE2EDuration="33.122818842s" podCreationTimestamp="2024-12-13 14:08:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:52.100327442 +0000 UTC m=+48.319258716" watchObservedRunningTime="2024-12-13 14:08:52.122818842 +0000 UTC m=+48.341750116" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.028 [INFO][4314] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.028 [INFO][4314] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" iface="eth0" netns="/var/run/netns/cni-541ed2e8-41d9-e536-a5ee-daa1fce2d0af" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.029 [INFO][4314] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" iface="eth0" netns="/var/run/netns/cni-541ed2e8-41d9-e536-a5ee-daa1fce2d0af" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.029 [INFO][4314] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" iface="eth0" netns="/var/run/netns/cni-541ed2e8-41d9-e536-a5ee-daa1fce2d0af" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.029 [INFO][4314] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.029 [INFO][4314] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.093 [INFO][4325] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.093 [INFO][4325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.093 [INFO][4325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.124 [WARNING][4325] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.124 [INFO][4325] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.126 [INFO][4325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:52.128960 env[1458]: 2024-12-13 14:08:52.128 [INFO][4314] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:08:52.131727 systemd[1]: run-netns-cni\x2d541ed2e8\x2d41d9\x2de536\x2da5ee\x2ddaa1fce2d0af.mount: Deactivated successfully. Dec 13 14:08:52.134651 env[1458]: time="2024-12-13T14:08:52.134599951Z" level=info msg="TearDown network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" successfully" Dec 13 14:08:52.134866 env[1458]: time="2024-12-13T14:08:52.134844306Z" level=info msg="StopPodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" returns successfully" Dec 13 14:08:52.133000 audit[4334]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=4334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:52.136020 env[1458]: time="2024-12-13T14:08:52.135994641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zc9pj,Uid:e44969a5-2dcd-4477-bb78-5481c7c194d8,Namespace:calico-system,Attempt:1,}" Dec 13 14:08:52.133000 audit[4334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe1781980 a2=0 a3=1 items=0 ppid=2715 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:52.142892 systemd-networkd[1616]: cali69ddccb4018: Gained IPv6LL Dec 13 14:08:52.149000 audit[4340]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:52.149000 audit[4340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4420 a0=3 a1=ffffdf9b3e80 a2=0 a3=1 items=0 ppid=2715 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:52.165000 audit[4340]: NETFILTER_CFG table=nat:102 family=2 entries=45 op=nft_register_chain pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:52.165000 audit[4340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffdf9b3e80 a2=0 a3=1 items=0 ppid=2715 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.124 [INFO][4319] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.124 [INFO][4319] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" iface="eth0" netns="/var/run/netns/cni-6119f018-e746-0d4c-1ebd-d7a53fa089f9" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.124 [INFO][4319] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" iface="eth0" netns="/var/run/netns/cni-6119f018-e746-0d4c-1ebd-d7a53fa089f9" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.124 [INFO][4319] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" iface="eth0" netns="/var/run/netns/cni-6119f018-e746-0d4c-1ebd-d7a53fa089f9" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.124 [INFO][4319] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.124 [INFO][4319] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.186 [INFO][4335] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.236 [INFO][4335] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.236 [INFO][4335] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.250 [WARNING][4335] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.250 [INFO][4335] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.253 [INFO][4335] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:52.259967 env[1458]: 2024-12-13 14:08:52.257 [INFO][4319] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:08:52.263192 env[1458]: time="2024-12-13T14:08:52.263143168Z" level=info msg="TearDown network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" successfully" Dec 13 14:08:52.263326 env[1458]: time="2024-12-13T14:08:52.263309765Z" level=info msg="StopPodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" returns successfully" Dec 13 14:08:52.264083 env[1458]: time="2024-12-13T14:08:52.264054749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-nz797,Uid:3eb6f562-b18f-47cb-86f6-2895ec700aa3,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:08:52.264865 systemd[1]: run-netns-cni\x2d6119f018\x2de746\x2d0d4c\x2d1ebd\x2dd7a53fa089f9.mount: Deactivated successfully. Dec 13 14:08:52.386447 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:52.386578 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a14b6b9ea5: link becomes ready Dec 13 14:08:52.388041 systemd-networkd[1616]: cali0a14b6b9ea5: Link UP Dec 13 14:08:52.388187 systemd-networkd[1616]: cali0a14b6b9ea5: Gained carrier Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.284 [INFO][4345] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.298 [INFO][4345] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0 csi-node-driver- calico-system e44969a5-2dcd-4477-bb78-5481c7c194d8 774 0 2024-12-13 14:08:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-52bcbbb462 csi-node-driver-zc9pj eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0a14b6b9ea5 [] []}} ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.298 [INFO][4345] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.327 [INFO][4358] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" HandleID="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.339 [INFO][4358] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" HandleID="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004b2710), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-52bcbbb462", "pod":"csi-node-driver-zc9pj", "timestamp":"2024-12-13 14:08:52.327429317 +0000 UTC"}, Hostname:"ci-3510.3.6-a-52bcbbb462", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.339 [INFO][4358] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.339 [INFO][4358] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.339 [INFO][4358] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-52bcbbb462' Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.341 [INFO][4358] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.345 [INFO][4358] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.350 [INFO][4358] ipam/ipam.go 489: Trying affinity for 192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.351 [INFO][4358] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.353 [INFO][4358] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.353 [INFO][4358] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.128/26 handle="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.355 [INFO][4358] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6 Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.360 [INFO][4358] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.128/26 handle="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.369 [INFO][4358] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.132/26] block=192.168.5.128/26 handle="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.369 [INFO][4358] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.132/26] handle="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.369 [INFO][4358] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:52.403029 env[1458]: 2024-12-13 14:08:52.369 [INFO][4358] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.132/26] IPv6=[] ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" HandleID="k8s-pod-network.c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.403736 env[1458]: 2024-12-13 14:08:52.371 [INFO][4345] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e44969a5-2dcd-4477-bb78-5481c7c194d8", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"", Pod:"csi-node-driver-zc9pj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0a14b6b9ea5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:52.403736 env[1458]: 2024-12-13 14:08:52.371 [INFO][4345] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.132/32] ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.403736 env[1458]: 2024-12-13 14:08:52.371 [INFO][4345] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0a14b6b9ea5 ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.403736 env[1458]: 2024-12-13 14:08:52.389 [INFO][4345] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.403736 env[1458]: 2024-12-13 14:08:52.389 [INFO][4345] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e44969a5-2dcd-4477-bb78-5481c7c194d8", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6", Pod:"csi-node-driver-zc9pj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0a14b6b9ea5", MAC:"32:cf:95:7f:fc:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:52.403736 env[1458]: 2024-12-13 14:08:52.401 [INFO][4345] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6" Namespace="calico-system" Pod="csi-node-driver-zc9pj" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:08:52.467483 env[1458]: time="2024-12-13T14:08:52.467407930Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:52.467746 env[1458]: time="2024-12-13T14:08:52.467693244Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:52.467846 env[1458]: time="2024-12-13T14:08:52.467825681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:52.470055 env[1458]: time="2024-12-13T14:08:52.470014675Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6 pid=4397 runtime=io.containerd.runc.v2 Dec 13 14:08:52.500116 systemd[1]: Started cri-containerd-c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6.scope. Dec 13 14:08:52.529213 systemd-networkd[1616]: calibdb350ced7f: Gained IPv6LL Dec 13 14:08:52.535301 systemd-networkd[1616]: cali5f552913675: Link UP Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.543130 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5f552913675: link becomes ready Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.534000 audit: BPF prog-id=157 op=LOAD Dec 13 14:08:52.536000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.536000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4397 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393834363731636137363263653136316530343338376535393438 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4397 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393834363731636137363263653136316530343338376535393438 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.537000 audit: BPF prog-id=158 op=LOAD Dec 13 14:08:52.537000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4397 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393834363731636137363263653136316530343338376535393438 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit: BPF prog-id=159 op=LOAD Dec 13 14:08:52.541000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4397 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393834363731636137363263653136316530343338376535393438 Dec 13 14:08:52.541000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:08:52.541000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.541000 audit: BPF prog-id=160 op=LOAD Dec 13 14:08:52.541000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4397 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339393834363731636137363263653136316530343338376535393438 Dec 13 14:08:52.542592 systemd-networkd[1616]: cali5f552913675: Gained carrier Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.421 [INFO][4364] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.440 [INFO][4364] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0 calico-apiserver-58fd6cbc6c- calico-apiserver 3eb6f562-b18f-47cb-86f6-2895ec700aa3 786 0 2024-12-13 14:08:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58fd6cbc6c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-52bcbbb462 calico-apiserver-58fd6cbc6c-nz797 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5f552913675 [] []}} ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.440 [INFO][4364] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.473 [INFO][4391] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" HandleID="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.487 [INFO][4391] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" HandleID="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003babb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-52bcbbb462", "pod":"calico-apiserver-58fd6cbc6c-nz797", "timestamp":"2024-12-13 14:08:52.473183727 +0000 UTC"}, Hostname:"ci-3510.3.6-a-52bcbbb462", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.487 [INFO][4391] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.487 [INFO][4391] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.487 [INFO][4391] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-52bcbbb462' Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.488 [INFO][4391] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.494 [INFO][4391] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.503 [INFO][4391] ipam/ipam.go 489: Trying affinity for 192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.505 [INFO][4391] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.510 [INFO][4391] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.510 [INFO][4391] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.128/26 handle="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.511 [INFO][4391] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483 Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.518 [INFO][4391] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.128/26 handle="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.529 [INFO][4391] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.133/26] block=192.168.5.128/26 handle="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.529 [INFO][4391] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.133/26] handle="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.529 [INFO][4391] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:52.566636 env[1458]: 2024-12-13 14:08:52.529 [INFO][4391] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.133/26] IPv6=[] ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" HandleID="k8s-pod-network.c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.567318 env[1458]: 2024-12-13 14:08:52.532 [INFO][4364] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"3eb6f562-b18f-47cb-86f6-2895ec700aa3", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"", Pod:"calico-apiserver-58fd6cbc6c-nz797", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f552913675", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:52.567318 env[1458]: 2024-12-13 14:08:52.532 [INFO][4364] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.133/32] ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.567318 env[1458]: 2024-12-13 14:08:52.532 [INFO][4364] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5f552913675 ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.567318 env[1458]: 2024-12-13 14:08:52.546 [INFO][4364] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.567318 env[1458]: 2024-12-13 14:08:52.550 [INFO][4364] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"3eb6f562-b18f-47cb-86f6-2895ec700aa3", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483", Pod:"calico-apiserver-58fd6cbc6c-nz797", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f552913675", MAC:"36:3f:81:25:82:a7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:52.567318 env[1458]: 2024-12-13 14:08:52.565 [INFO][4364] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-nz797" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:08:52.580029 env[1458]: time="2024-12-13T14:08:52.579950969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zc9pj,Uid:e44969a5-2dcd-4477-bb78-5481c7c194d8,Namespace:calico-system,Attempt:1,} returns sandbox id \"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6\"" Dec 13 14:08:52.613487 env[1458]: time="2024-12-13T14:08:52.613423935Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:52.613684 env[1458]: time="2024-12-13T14:08:52.613661330Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:52.613795 env[1458]: time="2024-12-13T14:08:52.613773488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:52.614070 env[1458]: time="2024-12-13T14:08:52.614042042Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483 pid=4451 runtime=io.containerd.runc.v2 Dec 13 14:08:52.638395 systemd[1]: Started cri-containerd-c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483.scope. Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit: BPF prog-id=161 op=LOAD Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4451 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334326436623838353166306362653466306231656461613565306565 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4451 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334326436623838353166306362653466306231656461613565306565 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit: BPF prog-id=162 op=LOAD Dec 13 14:08:52.661000 audit[4462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4451 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334326436623838353166306362653466306231656461613565306565 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit: BPF prog-id=163 op=LOAD Dec 13 14:08:52.661000 audit[4462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4451 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334326436623838353166306362653466306231656461613565306565 Dec 13 14:08:52.661000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:08:52.661000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.661000 audit: BPF prog-id=164 op=LOAD Dec 13 14:08:52.661000 audit[4462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4451 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334326436623838353166306362653466306231656461613565306565 Dec 13 14:08:52.688483 env[1458]: time="2024-12-13T14:08:52.688445294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-nz797,Uid:3eb6f562-b18f-47cb-86f6-2895ec700aa3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483\"" Dec 13 14:08:52.704818 env[1458]: time="2024-12-13T14:08:52.704783266Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:52.710932 env[1458]: time="2024-12-13T14:08:52.710884256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:52.714546 env[1458]: time="2024-12-13T14:08:52.714522818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:52.720992 env[1458]: time="2024-12-13T14:08:52.718304457Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:52.721773 env[1458]: time="2024-12-13T14:08:52.721737024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:08:52.724183 env[1458]: time="2024-12-13T14:08:52.723902978Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:08:52.730616 env[1458]: time="2024-12-13T14:08:52.730573876Z" level=info msg="CreateContainer within sandbox \"58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:08:52.765943 env[1458]: time="2024-12-13T14:08:52.765894482Z" level=info msg="CreateContainer within sandbox \"58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2\"" Dec 13 14:08:52.767792 env[1458]: time="2024-12-13T14:08:52.766655706Z" level=info msg="StartContainer for \"2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2\"" Dec 13 14:08:52.781423 systemd[1]: Started cri-containerd-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2.scope. Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.794000 audit: BPF prog-id=165 op=LOAD Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3935 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264623465376364376661633234643661303466373931373038643861 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3935 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264623465376364376661633234643661303466373931373038643861 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.795000 audit: BPF prog-id=166 op=LOAD Dec 13 14:08:52.795000 audit[4498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3935 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264623465376364376661633234643661303466373931373038643861 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit: BPF prog-id=167 op=LOAD Dec 13 14:08:52.796000 audit[4498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3935 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264623465376364376661633234643661303466373931373038643861 Dec 13 14:08:52.796000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:08:52.796000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:52.796000 audit: BPF prog-id=168 op=LOAD Dec 13 14:08:52.796000 audit[4498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3935 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:52.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264623465376364376661633234643661303466373931373038643861 Dec 13 14:08:52.824407 env[1458]: time="2024-12-13T14:08:52.824348355Z" level=info msg="StartContainer for \"2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2\" returns successfully" Dec 13 14:08:52.896063 env[1458]: time="2024-12-13T14:08:52.896020266Z" level=info msg="StopPodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\"" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.954 [INFO][4541] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.954 [INFO][4541] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" iface="eth0" netns="/var/run/netns/cni-989a88a7-446d-d6b0-229d-7a1644b8d0d4" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.954 [INFO][4541] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" iface="eth0" netns="/var/run/netns/cni-989a88a7-446d-d6b0-229d-7a1644b8d0d4" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.954 [INFO][4541] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" iface="eth0" netns="/var/run/netns/cni-989a88a7-446d-d6b0-229d-7a1644b8d0d4" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.954 [INFO][4541] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.954 [INFO][4541] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.987 [INFO][4552] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.987 [INFO][4552] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.987 [INFO][4552] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.997 [WARNING][4552] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.997 [INFO][4552] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:52.998 [INFO][4552] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:53.003152 env[1458]: 2024-12-13 14:08:53.000 [INFO][4541] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:08:53.006593 env[1458]: time="2024-12-13T14:08:53.003339216Z" level=info msg="TearDown network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" successfully" Dec 13 14:08:53.006593 env[1458]: time="2024-12-13T14:08:53.003369816Z" level=info msg="StopPodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" returns successfully" Dec 13 14:08:53.006925 env[1458]: time="2024-12-13T14:08:53.006896461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-zf8j2,Uid:b98e747a-729f-495a-aed8-df51ede6cf32,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:08:53.022005 systemd[1]: run-netns-cni\x2d989a88a7\x2d446d\x2dd6b0\x2d229d\x2d7a1644b8d0d4.mount: Deactivated successfully. Dec 13 14:08:53.198052 kubelet[2539]: I1213 14:08:53.197907 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5b47bfc6d6-s8nml" podStartSLOduration=23.873976713 podStartE2EDuration="26.197409599s" podCreationTimestamp="2024-12-13 14:08:27 +0000 UTC" firstStartedPulling="2024-12-13 14:08:50.398659291 +0000 UTC m=+46.617590565" lastFinishedPulling="2024-12-13 14:08:52.722092137 +0000 UTC m=+48.941023451" observedRunningTime="2024-12-13 14:08:53.078254115 +0000 UTC m=+49.297185389" watchObservedRunningTime="2024-12-13 14:08:53.197409599 +0000 UTC m=+49.416340872" Dec 13 14:08:53.230894 systemd-networkd[1616]: cali5f5b62c8f1a: Gained IPv6LL Dec 13 14:08:53.237244 kubelet[2539]: I1213 14:08:53.237205 2539 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:53.263291 systemd-networkd[1616]: cali5c6d3b1221a: Link UP Dec 13 14:08:53.266021 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5c6d3b1221a: link becomes ready Dec 13 14:08:53.265001 systemd-networkd[1616]: cali5c6d3b1221a: Gained carrier Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.132 [INFO][4566] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.152 [INFO][4566] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0 calico-apiserver-58fd6cbc6c- calico-apiserver b98e747a-729f-495a-aed8-df51ede6cf32 804 0 2024-12-13 14:08:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58fd6cbc6c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-52bcbbb462 calico-apiserver-58fd6cbc6c-zf8j2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5c6d3b1221a [] []}} ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.152 [INFO][4566] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.182 [INFO][4596] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" HandleID="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.203 [INFO][4596] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" HandleID="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001fb950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-52bcbbb462", "pod":"calico-apiserver-58fd6cbc6c-zf8j2", "timestamp":"2024-12-13 14:08:53.182353276 +0000 UTC"}, Hostname:"ci-3510.3.6-a-52bcbbb462", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.203 [INFO][4596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.203 [INFO][4596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.203 [INFO][4596] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-52bcbbb462' Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.208 [INFO][4596] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.217 [INFO][4596] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.224 [INFO][4596] ipam/ipam.go 489: Trying affinity for 192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.225 [INFO][4596] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.227 [INFO][4596] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.128/26 host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.227 [INFO][4596] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.128/26 handle="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.229 [INFO][4596] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57 Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.234 [INFO][4596] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.128/26 handle="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.248 [INFO][4596] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.134/26] block=192.168.5.128/26 handle="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.248 [INFO][4596] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.134/26] handle="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" host="ci-3510.3.6-a-52bcbbb462" Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.248 [INFO][4596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:53.283831 env[1458]: 2024-12-13 14:08:53.248 [INFO][4596] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.134/26] IPv6=[] ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" HandleID="k8s-pod-network.2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.284991 env[1458]: 2024-12-13 14:08:53.250 [INFO][4566] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"b98e747a-729f-495a-aed8-df51ede6cf32", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"", Pod:"calico-apiserver-58fd6cbc6c-zf8j2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5c6d3b1221a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:53.284991 env[1458]: 2024-12-13 14:08:53.250 [INFO][4566] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.134/32] ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.284991 env[1458]: 2024-12-13 14:08:53.250 [INFO][4566] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5c6d3b1221a ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.284991 env[1458]: 2024-12-13 14:08:53.255 [INFO][4566] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.284991 env[1458]: 2024-12-13 14:08:53.255 [INFO][4566] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"b98e747a-729f-495a-aed8-df51ede6cf32", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57", Pod:"calico-apiserver-58fd6cbc6c-zf8j2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5c6d3b1221a", MAC:"8a:aa:9d:af:39:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:53.284991 env[1458]: 2024-12-13 14:08:53.281 [INFO][4566] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57" Namespace="calico-apiserver" Pod="calico-apiserver-58fd6cbc6c-zf8j2" WorkloadEndpoint="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:08:53.305000 audit[4618]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:53.305000 audit[4618]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffcc0b73c0 a2=0 a3=1 items=0 ppid=2715 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:53.313000 audit[4618]: NETFILTER_CFG table=nat:104 family=2 entries=25 op=nft_register_chain pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:53.313000 audit[4618]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffcc0b73c0 a2=0 a3=1 items=0 ppid=2715 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:53.316221 env[1458]: time="2024-12-13T14:08:53.313980457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:53.316221 env[1458]: time="2024-12-13T14:08:53.314019296Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:53.316221 env[1458]: time="2024-12-13T14:08:53.314029416Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:53.316221 env[1458]: time="2024-12-13T14:08:53.314167573Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57 pid=4628 runtime=io.containerd.runc.v2 Dec 13 14:08:53.329838 systemd[1]: Started cri-containerd-2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57.scope. Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.343000 audit: BPF prog-id=169 op=LOAD Dec 13 14:08:53.343000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.343000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393265303835353065343663323062653434666636663933633636 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393265303835353065343663323062653434666636663933633636 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit: BPF prog-id=170 op=LOAD Dec 13 14:08:53.344000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393265303835353065343663323062653434666636663933633636 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.344000 audit: BPF prog-id=171 op=LOAD Dec 13 14:08:53.344000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393265303835353065343663323062653434666636663933633636 Dec 13 14:08:53.345000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:08:53.345000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.345000 audit: BPF prog-id=172 op=LOAD Dec 13 14:08:53.345000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4628 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393265303835353065343663323062653434666636663933633636 Dec 13 14:08:53.365782 env[1458]: time="2024-12-13T14:08:53.365737924Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58fd6cbc6c-zf8j2,Uid:b98e747a-729f-495a-aed8-df51ede6cf32,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57\"" Dec 13 14:08:53.551891 systemd-networkd[1616]: cali0a14b6b9ea5: Gained IPv6LL Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit: BPF prog-id=173 op=LOAD Dec 13 14:08:53.792000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd2ead3c8 a2=98 a3=ffffd2ead3b8 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.792000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.792000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit: BPF prog-id=174 op=LOAD Dec 13 14:08:53.792000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd2ead058 a2=74 a3=95 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.792000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.792000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.792000 audit: BPF prog-id=175 op=LOAD Dec 13 14:08:53.792000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd2ead0b8 a2=94 a3=2 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.792000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.792000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.887000 audit: BPF prog-id=176 op=LOAD Dec 13 14:08:53.887000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd2ead078 a2=40 a3=ffffd2ead0a8 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.888000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:08:53.888000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.888000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd2ead190 a2=50 a3=0 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.888000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.893219 env[1458]: time="2024-12-13T14:08:53.893180107Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd2ead0e8 a2=28 a3=ffffd2ead218 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2ead118 a2=28 a3=ffffd2ead248 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2eacfc8 a2=28 a3=ffffd2ead0f8 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd2ead138 a2=28 a3=ffffd2ead268 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd2ead118 a2=28 a3=ffffd2ead248 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd2ead108 a2=28 a3=ffffd2ead238 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd2ead138 a2=28 a3=ffffd2ead268 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2ead118 a2=28 a3=ffffd2ead248 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2ead138 a2=28 a3=ffffd2ead268 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd2ead108 a2=28 a3=ffffd2ead238 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd2ead188 a2=28 a3=ffffd2ead2c8 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd2eacec0 a2=50 a3=0 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit: BPF prog-id=177 op=LOAD Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd2eacec8 a2=94 a3=5 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.898000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:08:53.898000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.898000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd2eacfd0 a2=50 a3=0 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd2ead118 a2=4 a3=3 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { confidentiality } for pid=4678 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:53.899000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd2ead0f8 a2=94 a3=6 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { confidentiality } for pid=4678 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:53.899000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd2eac8c8 a2=94 a3=83 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.899000 audit[4678]: AVC avc: denied { confidentiality } for pid=4678 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:53.899000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd2eac8c8 a2=94 a3=83 items=0 ppid=4661 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:53.904689 env[1458]: time="2024-12-13T14:08:53.904647184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:53.908281 env[1458]: time="2024-12-13T14:08:53.908244628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit: BPF prog-id=178 op=LOAD Dec 13 14:08:53.908000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf9777e8 a2=98 a3=ffffcf9777d8 items=0 ppid=4661 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:08:53.908000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit: BPF prog-id=179 op=LOAD Dec 13 14:08:53.908000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf977698 a2=74 a3=95 items=0 ppid=4661 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:08:53.908000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:53.908000 audit: BPF prog-id=180 op=LOAD Dec 13 14:08:53.908000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf9776c8 a2=40 a3=ffffcf9776f8 items=0 ppid=4661 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:53.908000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:08:53.908000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:08:53.913139 env[1458]: time="2024-12-13T14:08:53.913097886Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:53.913802 env[1458]: time="2024-12-13T14:08:53.913758192Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:08:53.916838 env[1458]: time="2024-12-13T14:08:53.916810488Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:08:53.919170 env[1458]: time="2024-12-13T14:08:53.919144598Z" level=info msg="CreateContainer within sandbox \"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:08:53.956543 env[1458]: time="2024-12-13T14:08:53.956476650Z" level=info msg="CreateContainer within sandbox \"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9e6a23b803465d48f7d93fc2edc1078310c6294f54a34dc9cfd0aff3c50fd926\"" Dec 13 14:08:53.957255 env[1458]: time="2024-12-13T14:08:53.957227634Z" level=info msg="StartContainer for \"9e6a23b803465d48f7d93fc2edc1078310c6294f54a34dc9cfd0aff3c50fd926\"" Dec 13 14:08:53.999853 systemd[1]: Started cri-containerd-9e6a23b803465d48f7d93fc2edc1078310c6294f54a34dc9cfd0aff3c50fd926.scope. Dec 13 14:08:54.019237 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.BrxmeF.mount: Deactivated successfully. Dec 13 14:08:54.032000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.032000 audit[4702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4397 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366132336238303334363564343866376439336663326564633130 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.033000 audit: BPF prog-id=181 op=LOAD Dec 13 14:08:54.033000 audit[4702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4397 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366132336238303334363564343866376439336663326564633130 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit: BPF prog-id=182 op=LOAD Dec 13 14:08:54.034000 audit[4702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4397 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366132336238303334363564343866376439336663326564633130 Dec 13 14:08:54.034000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:08:54.034000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.034000 audit: BPF prog-id=183 op=LOAD Dec 13 14:08:54.034000 audit[4702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4397 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965366132336238303334363564343866376439336663326564633130 Dec 13 14:08:54.061949 systemd-networkd[1616]: vxlan.calico: Link UP Dec 13 14:08:54.061957 systemd-networkd[1616]: vxlan.calico: Gained carrier Dec 13 14:08:54.062860 systemd-networkd[1616]: cali5f552913675: Gained IPv6LL Dec 13 14:08:54.107564 env[1458]: time="2024-12-13T14:08:54.107524083Z" level=info msg="StartContainer for \"9e6a23b803465d48f7d93fc2edc1078310c6294f54a34dc9cfd0aff3c50fd926\" returns successfully" Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit: BPF prog-id=184 op=LOAD Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffca1b98e8 a2=98 a3=ffffca1b98d8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.119000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit: BPF prog-id=185 op=LOAD Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffca1b95c8 a2=74 a3=95 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.119000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit: BPF prog-id=186 op=LOAD Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffca1b9628 a2=94 a3=2 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.119000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffca1b9658 a2=28 a3=ffffca1b9788 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca1b9688 a2=28 a3=ffffca1b97b8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca1b9538 a2=28 a3=ffffca1b9668 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.119000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.119000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffca1b96a8 a2=28 a3=ffffca1b97d8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffca1b9688 a2=28 a3=ffffca1b97b8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffca1b9678 a2=28 a3=ffffca1b97a8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffca1b96a8 a2=28 a3=ffffca1b97d8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca1b9688 a2=28 a3=ffffca1b97b8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca1b96a8 a2=28 a3=ffffca1b97d8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffca1b9678 a2=28 a3=ffffca1b97a8 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffca1b96f8 a2=28 a3=ffffca1b9838 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit: BPF prog-id=187 op=LOAD Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffca1b9518 a2=40 a3=ffffca1b9548 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffca1b9540 a2=50 a3=0 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffca1b9540 a2=50 a3=0 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit: BPF prog-id=188 op=LOAD Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffca1b8ca8 a2=94 a3=2 items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.124000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.124000 audit: BPF prog-id=189 op=LOAD Dec 13 14:08:54.124000 audit[4748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffca1b8e38 a2=94 a3=2d items=0 ppid=4661 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.124000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit: BPF prog-id=190 op=LOAD Dec 13 14:08:54.129000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc3a5b128 a2=98 a3=ffffc3a5b118 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.129000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit: BPF prog-id=191 op=LOAD Dec 13 14:08:54.129000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3a5adb8 a2=74 a3=95 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.129000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.129000 audit: BPF prog-id=192 op=LOAD Dec 13 14:08:54.129000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3a5ae18 a2=94 a3=2 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.129000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.307000 audit: BPF prog-id=193 op=LOAD Dec 13 14:08:54.307000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3a5add8 a2=40 a3=ffffc3a5ae08 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.308000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:08:54.308000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.308000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc3a5aef0 a2=50 a3=0 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3a5ae48 a2=28 a3=ffffc3a5af78 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3a5ae78 a2=28 a3=ffffc3a5afa8 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3a5ad28 a2=28 a3=ffffc3a5ae58 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3a5ae98 a2=28 a3=ffffc3a5afc8 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3a5ae78 a2=28 a3=ffffc3a5afa8 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3a5ae68 a2=28 a3=ffffc3a5af98 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3a5ae98 a2=28 a3=ffffc3a5afc8 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3a5ae78 a2=28 a3=ffffc3a5afa8 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3a5ae98 a2=28 a3=ffffc3a5afc8 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3a5ae68 a2=28 a3=ffffc3a5af98 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.317000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.317000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3a5aee8 a2=28 a3=ffffc3a5b028 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.317000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3a5ac20 a2=50 a3=0 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit: BPF prog-id=194 op=LOAD Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc3a5ac28 a2=94 a3=5 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3a5ad30 a2=50 a3=0 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc3a5ae78 a2=4 a3=3 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { confidentiality } for pid=4750 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3a5ae58 a2=94 a3=6 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { confidentiality } for pid=4750 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3a5a628 a2=94 a3=83 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.318000 audit[4750]: AVC avc: denied { confidentiality } for pid=4750 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:54.318000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3a5a628 a2=94 a3=83 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.318000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.319000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.319000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3a5c068 a2=10 a3=ffffc3a5c158 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.319000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.319000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3a5bf28 a2=10 a3=ffffc3a5c018 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.319000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.319000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3a5be98 a2=10 a3=ffffc3a5c018 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.319000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:54.319000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3a5be98 a2=10 a3=ffffc3a5c018 items=0 ppid=4661 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.319000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:54.327000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:08:54.510878 systemd-networkd[1616]: cali5c6d3b1221a: Gained IPv6LL Dec 13 14:08:54.573000 audit[4814]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:54.573000 audit[4814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffa6cda10 a2=0 a3=ffff96febfa8 items=0 ppid=4661 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.573000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:54.579000 audit[4813]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:54.579000 audit[4813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffda2f08d0 a2=0 a3=ffffb89b1fa8 items=0 ppid=4661 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.579000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:54.600000 audit[4816]: NETFILTER_CFG table=filter:107 family=2 entries=215 op=nft_register_chain pid=4816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:54.601000 audit[4812]: NETFILTER_CFG table=raw:108 family=2 entries=21 op=nft_register_chain pid=4812 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:54.601000 audit[4812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffc81c880 a2=0 a3=ffff947c4fa8 items=0 ppid=4661 pid=4812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:54.600000 audit[4816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=125776 a0=3 a1=ffffcfcf9e30 a2=0 a3=ffffbd71afa8 items=0 ppid=4661 pid=4816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:54.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:55.407834 systemd-networkd[1616]: vxlan.calico: Gained IPv6LL Dec 13 14:08:58.772022 env[1458]: time="2024-12-13T14:08:58.771972991Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:58.778068 env[1458]: time="2024-12-13T14:08:58.778027109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:58.781668 env[1458]: time="2024-12-13T14:08:58.781618677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:58.784590 env[1458]: time="2024-12-13T14:08:58.784554938Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:58.785004 env[1458]: time="2024-12-13T14:08:58.784972289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:08:58.786869 env[1458]: time="2024-12-13T14:08:58.786226304Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:08:58.790350 env[1458]: time="2024-12-13T14:08:58.790313142Z" level=info msg="CreateContainer within sandbox \"c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:08:58.822035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1230227658.mount: Deactivated successfully. Dec 13 14:08:58.838089 env[1458]: time="2024-12-13T14:08:58.838031262Z" level=info msg="CreateContainer within sandbox \"c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fd45a6216603dd5130357ef41c96f4415dd3afc69cf02450158893a3f5a6babc\"" Dec 13 14:08:58.839378 env[1458]: time="2024-12-13T14:08:58.838654329Z" level=info msg="StartContainer for \"fd45a6216603dd5130357ef41c96f4415dd3afc69cf02450158893a3f5a6babc\"" Dec 13 14:08:58.875884 systemd[1]: Started cri-containerd-fd45a6216603dd5130357ef41c96f4415dd3afc69cf02450158893a3f5a6babc.scope. Dec 13 14:08:58.899740 kernel: kauditd_printk_skb: 1044 callbacks suppressed Dec 13 14:08:58.899881 kernel: audit: type=1400 audit(1734098938.887:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.925567 kernel: audit: type=1400 audit(1734098938.898:1283): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.925695 kernel: audit: type=1400 audit(1734098938.898:1284): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.957090 kernel: audit: type=1400 audit(1734098938.898:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.973590 kernel: audit: type=1400 audit(1734098938.898:1286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.990172 kernel: audit: type=1400 audit(1734098938.898:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.027882 kernel: audit: type=1400 audit(1734098938.898:1288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.027977 kernel: audit: type=1400 audit(1734098938.898:1289): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.046806 kernel: audit: type=1400 audit(1734098938.898:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.063249 kernel: audit: type=1400 audit(1734098938.907:1291): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.907000 audit: BPF prog-id=195 op=LOAD Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4451 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:58.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664343561363231363630336464353133303335376566343163393666 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4451 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:58.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664343561363231363630336464353133303335376566343163393666 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.908000 audit: BPF prog-id=196 op=LOAD Dec 13 14:08:58.908000 audit[4834]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4451 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:58.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664343561363231363630336464353133303335376566343163393666 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.924000 audit: BPF prog-id=197 op=LOAD Dec 13 14:08:58.924000 audit[4834]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4451 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:58.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664343561363231363630336464353133303335376566343163393666 Dec 13 14:08:58.939000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:08:58.939000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { perfmon } for pid=4834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit[4834]: AVC avc: denied { bpf } for pid=4834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:58.939000 audit: BPF prog-id=198 op=LOAD Dec 13 14:08:58.939000 audit[4834]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4451 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:58.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664343561363231363630336464353133303335376566343163393666 Dec 13 14:08:59.068664 env[1458]: time="2024-12-13T14:08:59.068085886Z" level=info msg="StartContainer for \"fd45a6216603dd5130357ef41c96f4415dd3afc69cf02450158893a3f5a6babc\" returns successfully" Dec 13 14:08:59.197659 env[1458]: time="2024-12-13T14:08:59.197589623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:59.198000 audit[4865]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:59.198000 audit[4865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffffac0800 a2=0 a3=1 items=0 ppid=2715 pid=4865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:59.204193 env[1458]: time="2024-12-13T14:08:59.204144533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:59.204000 audit[4865]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:59.204000 audit[4865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffffac0800 a2=0 a3=1 items=0 ppid=2715 pid=4865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:59.209412 env[1458]: time="2024-12-13T14:08:59.209371669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:59.214395 env[1458]: time="2024-12-13T14:08:59.214352769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:59.215015 env[1458]: time="2024-12-13T14:08:59.214985237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:08:59.216333 env[1458]: time="2024-12-13T14:08:59.216296570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:08:59.217564 env[1458]: time="2024-12-13T14:08:59.217518346Z" level=info msg="CreateContainer within sandbox \"2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:08:59.264609 env[1458]: time="2024-12-13T14:08:59.264561768Z" level=info msg="CreateContainer within sandbox \"2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"298c7ae4fd791bfd9b7b8056fa46325202f31a2fa280ad599b916831787975c5\"" Dec 13 14:08:59.265575 env[1458]: time="2024-12-13T14:08:59.265549028Z" level=info msg="StartContainer for \"298c7ae4fd791bfd9b7b8056fa46325202f31a2fa280ad599b916831787975c5\"" Dec 13 14:08:59.290419 systemd[1]: Started cri-containerd-298c7ae4fd791bfd9b7b8056fa46325202f31a2fa280ad599b916831787975c5.scope. Dec 13 14:08:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit: BPF prog-id=199 op=LOAD Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4628 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386337616534666437393162666439623762383035366661343633 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4628 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386337616534666437393162666439623762383035366661343633 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit: BPF prog-id=200 op=LOAD Dec 13 14:08:59.311000 audit[4875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4628 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386337616534666437393162666439623762383035366661343633 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.311000 audit: BPF prog-id=201 op=LOAD Dec 13 14:08:59.311000 audit[4875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4628 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386337616534666437393162666439623762383035366661343633 Dec 13 14:08:59.312000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:08:59.312000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:59.312000 audit: BPF prog-id=202 op=LOAD Dec 13 14:08:59.312000 audit[4875]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4628 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:59.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239386337616534666437393162666439623762383035366661343633 Dec 13 14:08:59.357797 env[1458]: time="2024-12-13T14:08:59.357746510Z" level=info msg="StartContainer for \"298c7ae4fd791bfd9b7b8056fa46325202f31a2fa280ad599b916831787975c5\" returns successfully" Dec 13 14:08:59.823168 systemd[1]: run-containerd-runc-k8s.io-fd45a6216603dd5130357ef41c96f4415dd3afc69cf02450158893a3f5a6babc-runc.m5uJth.mount: Deactivated successfully. Dec 13 14:08:59.863000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.863000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009ae600 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:59.863000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:59.863000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.863000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40012a8450 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:08:59.863000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:59.901000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.901000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40096bfa40 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:08:59.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:08:59.901000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.901000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400472fc20 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:08:59.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:08:59.903000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.903000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400377c660 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:08:59.903000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:08:59.919000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.919000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4008fb00f0 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:08:59.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:08:59.919000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.919000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400925c760 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:08:59.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:08:59.971000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.971000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40066f9c80 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:08:59.971000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:09:00.180344 kubelet[2539]: I1213 14:09:00.180221 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-nz797" podStartSLOduration=28.084694246 podStartE2EDuration="34.180164224s" podCreationTimestamp="2024-12-13 14:08:26 +0000 UTC" firstStartedPulling="2024-12-13 14:08:52.689918263 +0000 UTC m=+48.908849537" lastFinishedPulling="2024-12-13 14:08:58.785388241 +0000 UTC m=+55.004319515" observedRunningTime="2024-12-13 14:08:59.180375687 +0000 UTC m=+55.399306961" watchObservedRunningTime="2024-12-13 14:09:00.180164224 +0000 UTC m=+56.399095498" Dec 13 14:09:00.180727 kubelet[2539]: I1213 14:09:00.180638 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58fd6cbc6c-zf8j2" podStartSLOduration=28.332307002 podStartE2EDuration="34.180612135s" podCreationTimestamp="2024-12-13 14:08:26 +0000 UTC" firstStartedPulling="2024-12-13 14:08:53.367503327 +0000 UTC m=+49.586434601" lastFinishedPulling="2024-12-13 14:08:59.21580842 +0000 UTC m=+55.434739734" observedRunningTime="2024-12-13 14:09:00.179567916 +0000 UTC m=+56.398499150" watchObservedRunningTime="2024-12-13 14:09:00.180612135 +0000 UTC m=+56.399543409" Dec 13 14:09:00.212000 audit[4918]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:00.212000 audit[4918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdd1b2800 a2=0 a3=1 items=0 ppid=2715 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:00.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:00.216000 audit[4918]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:00.216000 audit[4918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdd1b2800 a2=0 a3=1 items=0 ppid=2715 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:00.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:00.462000 audit[4845]: AVC avc: denied { watch } for pid=4845 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_39.2030241200/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c858 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c858 tclass=file permissive=0 Dec 13 14:09:00.462000 audit[4845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000728d80 a2=fc6 a3=0 items=0 ppid=4451 pid=4845 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c858 key=(null) Dec 13 14:09:00.462000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:00.550000 audit[4921]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:00.550000 audit[4921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcaeb8580 a2=0 a3=1 items=0 ppid=2715 pid=4921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:00.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:00.555000 audit[4921]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=4921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:00.555000 audit[4921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcaeb8580 a2=0 a3=1 items=0 ppid=2715 pid=4921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:00.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:01.243575 env[1458]: time="2024-12-13T14:09:01.243532570Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:01.249365 env[1458]: time="2024-12-13T14:09:01.249321337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:01.253538 env[1458]: time="2024-12-13T14:09:01.253491295Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:01.257771 env[1458]: time="2024-12-13T14:09:01.257710413Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:09:01.258543 env[1458]: time="2024-12-13T14:09:01.258509197Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:09:01.261356 env[1458]: time="2024-12-13T14:09:01.261321742Z" level=info msg="CreateContainer within sandbox \"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:09:01.301710 env[1458]: time="2024-12-13T14:09:01.301661912Z" level=info msg="CreateContainer within sandbox \"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b2a516e7dc5b5d541ba94cd24c519a28d03db5b7e34bebec30b15d8a97efb776\"" Dec 13 14:09:01.302561 env[1458]: time="2024-12-13T14:09:01.302521655Z" level=info msg="StartContainer for \"b2a516e7dc5b5d541ba94cd24c519a28d03db5b7e34bebec30b15d8a97efb776\"" Dec 13 14:09:01.337074 systemd[1]: run-containerd-runc-k8s.io-b2a516e7dc5b5d541ba94cd24c519a28d03db5b7e34bebec30b15d8a97efb776-runc.l51OVy.mount: Deactivated successfully. Dec 13 14:09:01.340178 systemd[1]: Started cri-containerd-b2a516e7dc5b5d541ba94cd24c519a28d03db5b7e34bebec30b15d8a97efb776.scope. Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4397 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:01.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613531366537646335623564353431626139346364323463353139 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit: BPF prog-id=203 op=LOAD Dec 13 14:09:01.363000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4397 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:01.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613531366537646335623564353431626139346364323463353139 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit: BPF prog-id=204 op=LOAD Dec 13 14:09:01.363000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4397 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:01.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613531366537646335623564353431626139346364323463353139 Dec 13 14:09:01.363000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:09:01.363000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:09:01.363000 audit: BPF prog-id=205 op=LOAD Dec 13 14:09:01.363000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4397 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:01.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613531366537646335623564353431626139346364323463353139 Dec 13 14:09:01.387470 env[1458]: time="2024-12-13T14:09:01.387423191Z" level=info msg="StartContainer for \"b2a516e7dc5b5d541ba94cd24c519a28d03db5b7e34bebec30b15d8a97efb776\" returns successfully" Dec 13 14:09:01.587000 audit[4888]: AVC avc: denied { watch } for pid=4888 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_39.905788829/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c391 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c73,c391 tclass=file permissive=0 Dec 13 14:09:01.587000 audit[4888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40013a7e20 a2=fc6 a3=0 items=0 ppid=4628 pid=4888 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c391 key=(null) Dec 13 14:09:01.587000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:01.639000 audit[4959]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:01.639000 audit[4959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe54bd0e0 a2=0 a3=1 items=0 ppid=2715 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:01.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:01.644000 audit[4959]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:09:01.644000 audit[4959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe54bd0e0 a2=0 a3=1 items=0 ppid=2715 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:01.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:02.013754 kubelet[2539]: I1213 14:09:02.013696 2539 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:09:02.013754 kubelet[2539]: I1213 14:09:02.013760 2539 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:09:02.184465 kubelet[2539]: I1213 14:09:02.184433 2539 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-zc9pj" podStartSLOduration=27.508329526 podStartE2EDuration="36.184390167s" podCreationTimestamp="2024-12-13 14:08:26 +0000 UTC" firstStartedPulling="2024-12-13 14:08:52.582838748 +0000 UTC m=+48.801769982" lastFinishedPulling="2024-12-13 14:09:01.258899389 +0000 UTC m=+57.477830623" observedRunningTime="2024-12-13 14:09:02.183786498 +0000 UTC m=+58.402717772" watchObservedRunningTime="2024-12-13 14:09:02.184390167 +0000 UTC m=+58.403321441" Dec 13 14:09:03.918240 env[1458]: time="2024-12-13T14:09:03.917182288Z" level=info msg="StopPodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\"" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.957 [WARNING][4975] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0", GenerateName:"calico-kube-controllers-5b47bfc6d6-", Namespace:"calico-system", SelfLink:"", UID:"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b47bfc6d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee", Pod:"calico-kube-controllers-5b47bfc6d6-s8nml", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69ddccb4018", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.957 [INFO][4975] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.957 [INFO][4975] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" iface="eth0" netns="" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.957 [INFO][4975] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.957 [INFO][4975] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.991 [INFO][4981] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.991 [INFO][4981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:03.991 [INFO][4981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:04.006 [WARNING][4981] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:04.006 [INFO][4981] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:04.007 [INFO][4981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.010437 env[1458]: 2024-12-13 14:09:04.009 [INFO][4975] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.011020 env[1458]: time="2024-12-13T14:09:04.010983563Z" level=info msg="TearDown network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" successfully" Dec 13 14:09:04.011087 env[1458]: time="2024-12-13T14:09:04.011071721Z" level=info msg="StopPodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" returns successfully" Dec 13 14:09:04.011773 env[1458]: time="2024-12-13T14:09:04.011749628Z" level=info msg="RemovePodSandbox for \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\"" Dec 13 14:09:04.012067 env[1458]: time="2024-12-13T14:09:04.012026463Z" level=info msg="Forcibly stopping sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\"" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.054 [WARNING][4999] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0", GenerateName:"calico-kube-controllers-5b47bfc6d6-", Namespace:"calico-system", SelfLink:"", UID:"fafe55a3-0ec4-4bf8-9ff7-4261fc98f878", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b47bfc6d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"58eb1fbb85d86e26392ffba15d568e53089997c85c85e9ae780a7adcdc7c03ee", Pod:"calico-kube-controllers-5b47bfc6d6-s8nml", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69ddccb4018", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.055 [INFO][4999] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.055 [INFO][4999] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" iface="eth0" netns="" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.055 [INFO][4999] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.055 [INFO][4999] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.083 [INFO][5005] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.083 [INFO][5005] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.083 [INFO][5005] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.093 [WARNING][5005] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.093 [INFO][5005] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" HandleID="k8s-pod-network.cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--kube--controllers--5b47bfc6d6--s8nml-eth0" Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.096 [INFO][5005] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.099125 env[1458]: 2024-12-13 14:09:04.097 [INFO][4999] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c" Dec 13 14:09:04.099949 env[1458]: time="2024-12-13T14:09:04.099911583Z" level=info msg="TearDown network for sandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" successfully" Dec 13 14:09:04.108920 env[1458]: time="2024-12-13T14:09:04.108881651Z" level=info msg="RemovePodSandbox \"cbc39281285de51eccb7e4f2751d12679c55c0e705d5f4a7bfcece1c6d7ada0c\" returns successfully" Dec 13 14:09:04.109546 env[1458]: time="2024-12-13T14:09:04.109522599Z" level=info msg="StopPodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\"" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.159 [WARNING][5024] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e44969a5-2dcd-4477-bb78-5481c7c194d8", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6", Pod:"csi-node-driver-zc9pj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0a14b6b9ea5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.159 [INFO][5024] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.159 [INFO][5024] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" iface="eth0" netns="" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.159 [INFO][5024] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.159 [INFO][5024] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.199 [INFO][5031] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.199 [INFO][5031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.199 [INFO][5031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.207 [WARNING][5031] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.207 [INFO][5031] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.208 [INFO][5031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.211376 env[1458]: 2024-12-13 14:09:04.209 [INFO][5024] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.211951 env[1458]: time="2024-12-13T14:09:04.211915482Z" level=info msg="TearDown network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" successfully" Dec 13 14:09:04.212016 env[1458]: time="2024-12-13T14:09:04.212001960Z" level=info msg="StopPodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" returns successfully" Dec 13 14:09:04.212613 env[1458]: time="2024-12-13T14:09:04.212579189Z" level=info msg="RemovePodSandbox for \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\"" Dec 13 14:09:04.212690 env[1458]: time="2024-12-13T14:09:04.212618869Z" level=info msg="Forcibly stopping sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\"" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.249 [WARNING][5052] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e44969a5-2dcd-4477-bb78-5481c7c194d8", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"c9984671ca762ce161e04387e594881619a2e417aadae0d65d09cfc1003307d6", Pod:"csi-node-driver-zc9pj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0a14b6b9ea5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.250 [INFO][5052] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.250 [INFO][5052] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" iface="eth0" netns="" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.250 [INFO][5052] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.250 [INFO][5052] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.270 [INFO][5058] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.270 [INFO][5058] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.270 [INFO][5058] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.278 [WARNING][5058] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.278 [INFO][5058] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" HandleID="k8s-pod-network.8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Workload="ci--3510.3.6--a--52bcbbb462-k8s-csi--node--driver--zc9pj-eth0" Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.279 [INFO][5058] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.282739 env[1458]: 2024-12-13 14:09:04.281 [INFO][5052] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7" Dec 13 14:09:04.283255 env[1458]: time="2024-12-13T14:09:04.283218439Z" level=info msg="TearDown network for sandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" successfully" Dec 13 14:09:04.291479 env[1458]: time="2024-12-13T14:09:04.291434602Z" level=info msg="RemovePodSandbox \"8798571941a78f28dcf2c819bd6b4248023483745416f8bd5626f4003563daa7\" returns successfully" Dec 13 14:09:04.292177 env[1458]: time="2024-12-13T14:09:04.292151908Z" level=info msg="StopPodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\"" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.329 [WARNING][5076] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e4875b83-de4b-4659-96ef-49a812f321c5", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da", Pod:"coredns-76f75df574-522tj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb350ced7f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.329 [INFO][5076] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.329 [INFO][5076] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" iface="eth0" netns="" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.329 [INFO][5076] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.329 [INFO][5076] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.348 [INFO][5082] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.348 [INFO][5082] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.348 [INFO][5082] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.356 [WARNING][5082] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.357 [INFO][5082] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.358 [INFO][5082] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.361142 env[1458]: 2024-12-13 14:09:04.359 [INFO][5076] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.361656 env[1458]: time="2024-12-13T14:09:04.361620621Z" level=info msg="TearDown network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" successfully" Dec 13 14:09:04.361756 env[1458]: time="2024-12-13T14:09:04.361705499Z" level=info msg="StopPodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" returns successfully" Dec 13 14:09:04.362280 env[1458]: time="2024-12-13T14:09:04.362256888Z" level=info msg="RemovePodSandbox for \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\"" Dec 13 14:09:04.362454 env[1458]: time="2024-12-13T14:09:04.362413165Z" level=info msg="Forcibly stopping sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\"" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.399 [WARNING][5101] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e4875b83-de4b-4659-96ef-49a812f321c5", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"ab075a1059d9d471c265293f5776eca6a88d33658d2b773479463b44af34f3da", Pod:"coredns-76f75df574-522tj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibdb350ced7f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.399 [INFO][5101] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.399 [INFO][5101] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" iface="eth0" netns="" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.399 [INFO][5101] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.399 [INFO][5101] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.419 [INFO][5107] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.419 [INFO][5107] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.419 [INFO][5107] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.428 [WARNING][5107] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.428 [INFO][5107] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" HandleID="k8s-pod-network.ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--522tj-eth0" Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.429 [INFO][5107] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.432493 env[1458]: 2024-12-13 14:09:04.431 [INFO][5101] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f" Dec 13 14:09:04.433041 env[1458]: time="2024-12-13T14:09:04.433003616Z" level=info msg="TearDown network for sandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" successfully" Dec 13 14:09:04.463823 env[1458]: time="2024-12-13T14:09:04.462475293Z" level=info msg="RemovePodSandbox \"ee0a4a6c65b04463935df3d059492b62b8a59aeb4641c380992aef4c4800275f\" returns successfully" Dec 13 14:09:04.464517 env[1458]: time="2024-12-13T14:09:04.464489934Z" level=info msg="StopPodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\"" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.499 [WARNING][5125] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"b98e747a-729f-495a-aed8-df51ede6cf32", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57", Pod:"calico-apiserver-58fd6cbc6c-zf8j2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5c6d3b1221a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.499 [INFO][5125] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.499 [INFO][5125] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" iface="eth0" netns="" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.499 [INFO][5125] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.499 [INFO][5125] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.522 [INFO][5131] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.522 [INFO][5131] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.522 [INFO][5131] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.530 [WARNING][5131] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.530 [INFO][5131] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.531 [INFO][5131] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.534177 env[1458]: 2024-12-13 14:09:04.533 [INFO][5125] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.534673 env[1458]: time="2024-12-13T14:09:04.534640233Z" level=info msg="TearDown network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" successfully" Dec 13 14:09:04.534769 env[1458]: time="2024-12-13T14:09:04.534751671Z" level=info msg="StopPodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" returns successfully" Dec 13 14:09:04.535290 env[1458]: time="2024-12-13T14:09:04.535268261Z" level=info msg="RemovePodSandbox for \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\"" Dec 13 14:09:04.535523 env[1458]: time="2024-12-13T14:09:04.535484257Z" level=info msg="Forcibly stopping sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\"" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.574 [WARNING][5150] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"b98e747a-729f-495a-aed8-df51ede6cf32", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"2492e08550e46c20be44ff6f93c661a72008035b5dc45a9d276124c2fe4adb57", Pod:"calico-apiserver-58fd6cbc6c-zf8j2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5c6d3b1221a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.575 [INFO][5150] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.575 [INFO][5150] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" iface="eth0" netns="" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.575 [INFO][5150] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.575 [INFO][5150] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.594 [INFO][5156] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.594 [INFO][5156] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.594 [INFO][5156] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.604 [WARNING][5156] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.604 [INFO][5156] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" HandleID="k8s-pod-network.2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--zf8j2-eth0" Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.606 [INFO][5156] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.609599 env[1458]: 2024-12-13 14:09:04.608 [INFO][5150] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e" Dec 13 14:09:04.610393 env[1458]: time="2024-12-13T14:09:04.610322827Z" level=info msg="TearDown network for sandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" successfully" Dec 13 14:09:04.618773 env[1458]: time="2024-12-13T14:09:04.618691147Z" level=info msg="RemovePodSandbox \"2a71bc4481690f2c47ad6d989e6a52dce8f4548eaf21b17f0d5daf690de0312e\" returns successfully" Dec 13 14:09:04.619501 env[1458]: time="2024-12-13T14:09:04.619463452Z" level=info msg="StopPodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\"" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.660 [WARNING][5177] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"3eb6f562-b18f-47cb-86f6-2895ec700aa3", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483", Pod:"calico-apiserver-58fd6cbc6c-nz797", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f552913675", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.660 [INFO][5177] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.660 [INFO][5177] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" iface="eth0" netns="" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.660 [INFO][5177] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.660 [INFO][5177] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.679 [INFO][5189] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.679 [INFO][5189] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.679 [INFO][5189] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.687 [WARNING][5189] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.687 [INFO][5189] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.689 [INFO][5189] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.692082 env[1458]: 2024-12-13 14:09:04.690 [INFO][5177] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.692754 env[1458]: time="2024-12-13T14:09:04.692666893Z" level=info msg="TearDown network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" successfully" Dec 13 14:09:04.692858 env[1458]: time="2024-12-13T14:09:04.692837330Z" level=info msg="StopPodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" returns successfully" Dec 13 14:09:04.693479 env[1458]: time="2024-12-13T14:09:04.693445638Z" level=info msg="RemovePodSandbox for \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\"" Dec 13 14:09:04.693561 env[1458]: time="2024-12-13T14:09:04.693484157Z" level=info msg="Forcibly stopping sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\"" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.730 [WARNING][5209] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0", GenerateName:"calico-apiserver-58fd6cbc6c-", Namespace:"calico-apiserver", SelfLink:"", UID:"3eb6f562-b18f-47cb-86f6-2895ec700aa3", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58fd6cbc6c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"c42d6b8851f0cbe4f0b1edaa5e0ee939990485166da5f315c8b18fd28ce6c483", Pod:"calico-apiserver-58fd6cbc6c-nz797", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f552913675", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.731 [INFO][5209] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.731 [INFO][5209] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" iface="eth0" netns="" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.731 [INFO][5209] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.731 [INFO][5209] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.753 [INFO][5215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.753 [INFO][5215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.753 [INFO][5215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.762 [WARNING][5215] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.762 [INFO][5215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" HandleID="k8s-pod-network.1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Workload="ci--3510.3.6--a--52bcbbb462-k8s-calico--apiserver--58fd6cbc6c--nz797-eth0" Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.763 [INFO][5215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.767035 env[1458]: 2024-12-13 14:09:04.764 [INFO][5209] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce" Dec 13 14:09:04.767035 env[1458]: time="2024-12-13T14:09:04.766018091Z" level=info msg="TearDown network for sandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" successfully" Dec 13 14:09:04.774802 env[1458]: time="2024-12-13T14:09:04.774744684Z" level=info msg="RemovePodSandbox \"1d1bb66491964ce50ea272a13ef1709f719fa797356d1dba0f7d1d1d3e4c64ce\" returns successfully" Dec 13 14:09:04.775446 env[1458]: time="2024-12-13T14:09:04.775410151Z" level=info msg="StopPodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\"" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.810 [WARNING][5234] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"987215b8-eed8-4844-889d-860261cd7ad5", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893", Pod:"coredns-76f75df574-pktcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f5b62c8f1a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.811 [INFO][5234] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.811 [INFO][5234] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" iface="eth0" netns="" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.811 [INFO][5234] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.811 [INFO][5234] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.830 [INFO][5242] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.830 [INFO][5242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.830 [INFO][5242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.839 [WARNING][5242] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.839 [INFO][5242] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.840 [INFO][5242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.843165 env[1458]: 2024-12-13 14:09:04.841 [INFO][5234] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.843611 env[1458]: time="2024-12-13T14:09:04.843193936Z" level=info msg="TearDown network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" successfully" Dec 13 14:09:04.843611 env[1458]: time="2024-12-13T14:09:04.843226895Z" level=info msg="StopPodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" returns successfully" Dec 13 14:09:04.844105 env[1458]: time="2024-12-13T14:09:04.844076239Z" level=info msg="RemovePodSandbox for \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\"" Dec 13 14:09:04.844226 env[1458]: time="2024-12-13T14:09:04.844110558Z" level=info msg="Forcibly stopping sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\"" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.879 [WARNING][5260] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"987215b8-eed8-4844-889d-860261cd7ad5", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-52bcbbb462", ContainerID:"047669be333d94a5c9509451dcde2a36883ef36c8086c86842e17800a8c56893", Pod:"coredns-76f75df574-pktcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5f5b62c8f1a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.880 [INFO][5260] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.880 [INFO][5260] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" iface="eth0" netns="" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.880 [INFO][5260] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.880 [INFO][5260] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.898 [INFO][5267] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.899 [INFO][5267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.899 [INFO][5267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.908 [WARNING][5267] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.908 [INFO][5267] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" HandleID="k8s-pod-network.e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Workload="ci--3510.3.6--a--52bcbbb462-k8s-coredns--76f75df574--pktcl-eth0" Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.909 [INFO][5267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:09:04.912958 env[1458]: 2024-12-13 14:09:04.911 [INFO][5260] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba" Dec 13 14:09:04.913600 env[1458]: time="2024-12-13T14:09:04.913566471Z" level=info msg="TearDown network for sandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" successfully" Dec 13 14:09:04.923910 env[1458]: time="2024-12-13T14:09:04.923862074Z" level=info msg="RemovePodSandbox \"e794c09b1e9f4e864a1a2fd5f13793b79a56301b95da2bcadcedc1870bfef1ba\" returns successfully" Dec 13 14:09:08.442474 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.AUvxoX.mount: Deactivated successfully. Dec 13 14:09:17.420000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.425670 kernel: kauditd_printk_skb: 201 callbacks suppressed Dec 13 14:09:17.425804 kernel: audit: type=1400 audit(1734098957.420:1342): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.420000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.466675 kernel: audit: type=1400 audit(1734098957.420:1343): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.420000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.487584 kernel: audit: type=1400 audit(1734098957.420:1344): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.420000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400132a480 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.537849 kernel: audit: type=1300 audit(1734098957.420:1344): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400132a480 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.537954 kernel: audit: type=1327 audit(1734098957.420:1344): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.421000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.558172 kernel: audit: type=1400 audit(1734098957.421:1345): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:17.421000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400132a960 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.586988 kernel: audit: type=1300 audit(1734098957.421:1345): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400132a960 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.610190 kernel: audit: type=1327 audit(1734098957.421:1345): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.420000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400132a460 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.637566 kernel: audit: type=1300 audit(1734098957.420:1343): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400132a460 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.420000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40013e6140 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:17.660813 kernel: audit: type=1327 audit(1734098957.420:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:17.908213 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.GEB7Az.mount: Deactivated successfully. Dec 13 14:09:32.753591 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.qUNzMm.mount: Deactivated successfully. Dec 13 14:09:38.439572 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.bZEyht.mount: Deactivated successfully. Dec 13 14:09:47.900553 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.MlS6cE.mount: Deactivated successfully. Dec 13 14:09:59.864000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.870527 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:09:59.870642 kernel: audit: type=1400 audit(1734098999.864:1346): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.864000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d3260 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:59.918693 kernel: audit: type=1300 audit(1734098999.864:1346): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d3260 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:59.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:59.941909 kernel: audit: type=1327 audit(1734098999.864:1346): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:59.865000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.963216 kernel: audit: type=1400 audit(1734098999.865:1347): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.963330 kernel: audit: type=1300 audit(1734098999.865:1347): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029408d0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:59.865000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029408d0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:09:59.865000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:00.012809 kernel: audit: type=1327 audit(1734098999.865:1347): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:59.903000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:00.034096 kernel: audit: type=1400 audit(1734098999.903:1348): avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:00.034236 kernel: audit: type=1300 audit(1734098999.903:1348): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400d3ab890 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.903000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400d3ab890 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.903000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:00.082824 kernel: audit: type=1327 audit(1734098999.903:1348): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:09:59.903000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:00.107525 kernel: audit: type=1400 audit(1734098999.903:1349): avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.903000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400cb45640 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.903000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:09:59.918000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.918000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400eac3410 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:09:59.921000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.921000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400d5273a0 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.921000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:09:59.921000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.921000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400eac3560 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.921000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:09:59.989000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.989000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400eac3860 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:09:59.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:00.465000 audit[4845]: AVC avc: denied { watch } for pid=4845 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_39.2030241200/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c858 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c858 tclass=file permissive=0 Dec 13 14:10:00.465000 audit[4845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009a3120 a2=fc6 a3=0 items=0 ppid=4451 pid=4845 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c858 key=(null) Dec 13 14:10:00.465000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:10:01.588000 audit[4888]: AVC avc: denied { watch } for pid=4888 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_39.905788829/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c391 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c73,c391 tclass=file permissive=0 Dec 13 14:10:01.588000 audit[4888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40023d7740 a2=fc6 a3=0 items=0 ppid=4628 pid=4888 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c391 key=(null) Dec 13 14:10:01.588000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:10:08.441290 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.3iiu1B.mount: Deactivated successfully. Dec 13 14:10:17.420000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.427532 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:10:17.427698 kernel: audit: type=1400 audit(1734099017.420:1356): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.420000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d2300 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.479695 kernel: audit: type=1300 audit(1734099017.420:1356): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d2300 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.503647 kernel: audit: type=1327 audit(1734099017.420:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.503803 kernel: audit: type=1400 audit(1734099017.420:1357): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.420000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.420000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d2320 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.554675 kernel: audit: type=1300 audit(1734099017.420:1357): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d2320 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.420000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.579753 kernel: audit: type=1327 audit(1734099017.420:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.421000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.602271 kernel: audit: type=1400 audit(1734099017.421:1358): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.421000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d2340 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.630937 kernel: audit: type=1300 audit(1734099017.421:1358): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029d2340 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.421000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.654628 kernel: audit: type=1327 audit(1734099017.421:1358): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.426000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.676544 kernel: audit: type=1400 audit(1734099017.426:1359): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:17.426000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002cc6300 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:17.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:17.904150 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.wJtads.mount: Deactivated successfully. Dec 13 14:10:32.749018 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.HVeo9B.mount: Deactivated successfully. Dec 13 14:10:34.819080 systemd[1]: Started sshd@7-10.200.20.4:22-10.200.16.10:40796.service. Dec 13 14:10:34.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.16.10:40796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.825286 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:10:34.825486 kernel: audit: type=1130 audit(1734099034.818:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.16.10:40796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:35.256000 audit[5500]: USER_ACCT pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.257191 sshd[5500]: Accepted publickey for core from 10.200.16.10 port 40796 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:35.259191 sshd[5500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:35.258000 audit[5500]: CRED_ACQ pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.303112 kernel: audit: type=1101 audit(1734099035.256:1361): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.303300 kernel: audit: type=1103 audit(1734099035.258:1362): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.317461 kernel: audit: type=1006 audit(1734099035.258:1363): pid=5500 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:10:35.320149 kernel: audit: type=1300 audit(1734099035.258:1363): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff54af800 a2=3 a3=1 items=0 ppid=1 pid=5500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:35.258000 audit[5500]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff54af800 a2=3 a3=1 items=0 ppid=1 pid=5500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:35.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:35.346380 systemd-logind[1445]: New session 10 of user core. Dec 13 14:10:35.347936 systemd[1]: Started session-10.scope. Dec 13 14:10:35.351262 kernel: audit: type=1327 audit(1734099035.258:1363): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:35.356000 audit[5500]: USER_START pid=5500 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.381000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.403753 kernel: audit: type=1105 audit(1734099035.356:1364): pid=5500 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.403907 kernel: audit: type=1103 audit(1734099035.381:1365): pid=5502 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.734859 sshd[5500]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:35.735000 audit[5500]: USER_END pid=5500 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.738258 systemd-logind[1445]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:10:35.739271 systemd[1]: sshd@7-10.200.20.4:22-10.200.16.10:40796.service: Deactivated successfully. Dec 13 14:10:35.740110 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:10:35.741784 systemd-logind[1445]: Removed session 10. Dec 13 14:10:35.735000 audit[5500]: CRED_DISP pid=5500 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.781800 kernel: audit: type=1106 audit(1734099035.735:1366): pid=5500 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.781924 kernel: audit: type=1104 audit(1734099035.735:1367): pid=5500 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.16.10:40796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:38.445377 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.22lGA0.mount: Deactivated successfully. Dec 13 14:10:40.813771 systemd[1]: Started sshd@8-10.200.20.4:22-10.200.16.10:45164.service. Dec 13 14:10:40.820859 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:40.821009 kernel: audit: type=1130 audit(1734099040.813:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.16.10:45164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:40.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.16.10:45164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:41.273000 audit[5531]: USER_ACCT pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.274234 sshd[5531]: Accepted publickey for core from 10.200.16.10 port 45164 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:41.296000 audit[5531]: CRED_ACQ pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.298025 sshd[5531]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:41.319156 kernel: audit: type=1101 audit(1734099041.273:1370): pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.319303 kernel: audit: type=1103 audit(1734099041.296:1371): pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.333191 kernel: audit: type=1006 audit(1734099041.296:1372): pid=5531 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:10:41.296000 audit[5531]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde440e90 a2=3 a3=1 items=0 ppid=1 pid=5531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.356774 kernel: audit: type=1300 audit(1734099041.296:1372): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde440e90 a2=3 a3=1 items=0 ppid=1 pid=5531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:41.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:41.364629 kernel: audit: type=1327 audit(1734099041.296:1372): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:41.367888 systemd-logind[1445]: New session 11 of user core. Dec 13 14:10:41.368665 systemd[1]: Started session-11.scope. Dec 13 14:10:41.373000 audit[5531]: USER_START pid=5531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.373000 audit[5533]: CRED_ACQ pid=5533 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.418307 kernel: audit: type=1105 audit(1734099041.373:1373): pid=5531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.418427 kernel: audit: type=1103 audit(1734099041.373:1374): pid=5533 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.695091 sshd[5531]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:41.695000 audit[5531]: USER_END pid=5531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.698267 systemd-logind[1445]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:10:41.700636 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:10:41.701889 systemd-logind[1445]: Removed session 11. Dec 13 14:10:41.702600 systemd[1]: sshd@8-10.200.20.4:22-10.200.16.10:45164.service: Deactivated successfully. Dec 13 14:10:41.695000 audit[5531]: CRED_DISP pid=5531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.748301 kernel: audit: type=1106 audit(1734099041.695:1375): pid=5531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.748595 kernel: audit: type=1104 audit(1734099041.695:1376): pid=5531 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.16.10:45164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:46.770210 systemd[1]: Started sshd@9-10.200.20.4:22-10.200.16.10:45174.service. Dec 13 14:10:46.797087 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:46.797190 kernel: audit: type=1130 audit(1734099046.769:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.16.10:45174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:46.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.16.10:45174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:47.215000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.216907 sshd[5544]: Accepted publickey for core from 10.200.16.10 port 45174 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:47.218641 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:47.217000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.259830 kernel: audit: type=1101 audit(1734099047.215:1379): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.259930 kernel: audit: type=1103 audit(1734099047.217:1380): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.273407 kernel: audit: type=1006 audit(1734099047.217:1381): pid=5544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:10:47.217000 audit[5544]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffe8c100 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:47.304330 kernel: audit: type=1300 audit(1734099047.217:1381): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffe8c100 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:47.304433 kernel: audit: type=1327 audit(1734099047.217:1381): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:47.306262 systemd-logind[1445]: New session 12 of user core. Dec 13 14:10:47.306770 systemd[1]: Started session-12.scope. Dec 13 14:10:47.310000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.335804 kernel: audit: type=1105 audit(1734099047.310:1382): pid=5544 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.335000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.356754 kernel: audit: type=1103 audit(1734099047.335:1383): pid=5546 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.686463 sshd[5544]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:47.686000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.686000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.713808 systemd-logind[1445]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:10:47.715011 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:10:47.716120 systemd-logind[1445]: Removed session 12. Dec 13 14:10:47.716788 systemd[1]: sshd@9-10.200.20.4:22-10.200.16.10:45174.service: Deactivated successfully. Dec 13 14:10:47.730942 kernel: audit: type=1106 audit(1734099047.686:1384): pid=5544 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.731044 kernel: audit: type=1104 audit(1734099047.686:1385): pid=5544 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:47.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.16.10:45174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:47.753974 systemd[1]: Started sshd@10-10.200.20.4:22-10.200.16.10:45176.service. Dec 13 14:10:47.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.16.10:45176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:47.903125 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.aT4DVG.mount: Deactivated successfully. Dec 13 14:10:48.185000 audit[5557]: USER_ACCT pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:48.186269 sshd[5557]: Accepted publickey for core from 10.200.16.10 port 45176 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:48.187385 sshd[5557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:48.186000 audit[5557]: CRED_ACQ pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:48.186000 audit[5557]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff697b440 a2=3 a3=1 items=0 ppid=1 pid=5557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:48.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:48.191885 systemd[1]: Started session-13.scope. Dec 13 14:10:48.192199 systemd-logind[1445]: New session 13 of user core. Dec 13 14:10:48.195000 audit[5557]: USER_START pid=5557 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:48.196000 audit[5582]: CRED_ACQ pid=5582 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:48.597028 sshd[5557]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:48.597000 audit[5557]: USER_END pid=5557 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:48.597000 audit[5557]: CRED_DISP pid=5557 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:48.600342 systemd[1]: sshd@10-10.200.20.4:22-10.200.16.10:45176.service: Deactivated successfully. Dec 13 14:10:48.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.16.10:45176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:48.600862 systemd-logind[1445]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:10:48.601168 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:10:48.602251 systemd-logind[1445]: Removed session 13. Dec 13 14:10:48.675168 systemd[1]: Started sshd@11-10.200.20.4:22-10.200.16.10:38954.service. Dec 13 14:10:48.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.16.10:38954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:49.111000 audit[5589]: USER_ACCT pid=5589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:49.112307 sshd[5589]: Accepted publickey for core from 10.200.16.10 port 38954 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:49.112000 audit[5589]: CRED_ACQ pid=5589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:49.112000 audit[5589]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff28ca900 a2=3 a3=1 items=0 ppid=1 pid=5589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:49.112000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:49.113918 sshd[5589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:49.118477 systemd[1]: Started session-14.scope. Dec 13 14:10:49.118927 systemd-logind[1445]: New session 14 of user core. Dec 13 14:10:49.122000 audit[5589]: USER_START pid=5589 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:49.123000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:49.496480 sshd[5589]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:49.496000 audit[5589]: USER_END pid=5589 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:49.497000 audit[5589]: CRED_DISP pid=5589 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:49.499335 systemd[1]: sshd@11-10.200.20.4:22-10.200.16.10:38954.service: Deactivated successfully. Dec 13 14:10:49.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.16.10:38954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:49.500097 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:10:49.500877 systemd-logind[1445]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:10:49.501580 systemd-logind[1445]: Removed session 14. Dec 13 14:10:54.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.16.10:38964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:54.562512 systemd[1]: Started sshd@12-10.200.20.4:22-10.200.16.10:38964.service. Dec 13 14:10:54.568736 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:10:54.568880 kernel: audit: type=1130 audit(1734099054.560:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.16.10:38964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:54.979000 audit[5608]: USER_ACCT pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:54.981292 sshd[5608]: Accepted publickey for core from 10.200.16.10 port 38964 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:55.002000 audit[5608]: CRED_ACQ pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.005028 sshd[5608]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:55.025207 kernel: audit: type=1101 audit(1734099054.979:1406): pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.025337 kernel: audit: type=1103 audit(1734099055.002:1407): pid=5608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.038244 kernel: audit: type=1006 audit(1734099055.002:1408): pid=5608 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:10:55.002000 audit[5608]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4aed070 a2=3 a3=1 items=0 ppid=1 pid=5608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:55.059969 kernel: audit: type=1300 audit(1734099055.002:1408): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4aed070 a2=3 a3=1 items=0 ppid=1 pid=5608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:55.002000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:55.067917 kernel: audit: type=1327 audit(1734099055.002:1408): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:55.070366 systemd-logind[1445]: New session 15 of user core. Dec 13 14:10:55.070885 systemd[1]: Started session-15.scope. Dec 13 14:10:55.073000 audit[5608]: USER_START pid=5608 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.098000 audit[5610]: CRED_ACQ pid=5610 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.120366 kernel: audit: type=1105 audit(1734099055.073:1409): pid=5608 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.120481 kernel: audit: type=1103 audit(1734099055.098:1410): pid=5610 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.425112 sshd[5608]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:55.424000 audit[5608]: USER_END pid=5608 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.430581 systemd-logind[1445]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:10:55.431815 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:10:55.432876 systemd-logind[1445]: Removed session 15. Dec 13 14:10:55.433513 systemd[1]: sshd@12-10.200.20.4:22-10.200.16.10:38964.service: Deactivated successfully. Dec 13 14:10:55.427000 audit[5608]: CRED_DISP pid=5608 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.470919 kernel: audit: type=1106 audit(1734099055.424:1411): pid=5608 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.471060 kernel: audit: type=1104 audit(1734099055.427:1412): pid=5608 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:55.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.16.10:38964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:59.864000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.870940 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:59.871075 kernel: audit: type=1400 audit(1734099059.864:1414): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.864000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.913103 kernel: audit: type=1400 audit(1734099059.864:1415): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.864000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d4c980 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:59.941517 kernel: audit: type=1300 audit(1734099059.864:1414): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d4c980 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:59.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:59.972334 kernel: audit: type=1327 audit(1734099059.864:1414): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:59.972473 kernel: audit: type=1300 audit(1734099059.864:1415): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400126d2c0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:59.864000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400126d2c0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:10:59.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:00.024247 kernel: audit: type=1327 audit(1734099059.864:1415): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:59.911000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:00.047660 kernel: audit: type=1400 audit(1734099059.911:1416): avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.911000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400ddb5350 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:11:00.074968 kernel: audit: type=1300 audit(1734099059.911:1416): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400ddb5350 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:10:59.911000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:11:00.100045 kernel: audit: type=1327 audit(1734099059.911:1416): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:59.911000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:00.121391 kernel: audit: type=1400 audit(1734099059.911:1417): avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.911000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400cb44380 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:10:59.911000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:59.917000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.917000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400e5a2570 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:10:59.917000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:59.921000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.921000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400e5a2690 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:10:59.921000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:59.921000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.921000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400cb44520 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:10:59.921000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:10:59.996000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:59.996000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400e5a28a0 a2=fc6 a3=0 items=0 ppid=2305 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c785 key=(null) Dec 13 14:10:59.996000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:11:00.464000 audit[4845]: AVC avc: denied { watch } for pid=4845 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_39.2030241200/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c858 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c858 tclass=file permissive=0 Dec 13 14:11:00.464000 audit[4845]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400158a840 a2=fc6 a3=0 items=0 ppid=4451 pid=4845 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c858 key=(null) Dec 13 14:11:00.464000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:11:00.502196 systemd[1]: Started sshd@13-10.200.20.4:22-10.200.16.10:53874.service. Dec 13 14:11:00.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.16.10:53874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:00.947000 audit[5619]: USER_ACCT pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:00.949241 sshd[5619]: Accepted publickey for core from 10.200.16.10 port 53874 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:00.948000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:00.948000 audit[5619]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed2251e0 a2=3 a3=1 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:00.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:00.951001 sshd[5619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:00.955085 systemd-logind[1445]: New session 16 of user core. Dec 13 14:11:00.955620 systemd[1]: Started session-16.scope. Dec 13 14:11:00.959000 audit[5619]: USER_START pid=5619 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:00.960000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:01.352298 sshd[5619]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:01.352000 audit[5619]: USER_END pid=5619 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:01.352000 audit[5619]: CRED_DISP pid=5619 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:01.356071 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:11:01.356741 systemd-logind[1445]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:11:01.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.16.10:53874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:01.356863 systemd[1]: sshd@13-10.200.20.4:22-10.200.16.10:53874.service: Deactivated successfully. Dec 13 14:11:01.358076 systemd-logind[1445]: Removed session 16. Dec 13 14:11:01.588000 audit[4888]: AVC avc: denied { watch } for pid=4888 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_39.905788829/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c73,c391 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c73,c391 tclass=file permissive=0 Dec 13 14:11:01.588000 audit[4888]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40023d77e0 a2=fc6 a3=0 items=0 ppid=4628 pid=4888 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c73,c391 key=(null) Dec 13 14:11:01.588000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:11:06.421637 systemd[1]: Started sshd@14-10.200.20.4:22-10.200.16.10:53888.service. Dec 13 14:11:06.449767 kernel: kauditd_printk_skb: 31 callbacks suppressed Dec 13 14:11:06.449843 kernel: audit: type=1130 audit(1734099066.421:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.16.10:53888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:06.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.16.10:53888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:06.841000 audit[5635]: USER_ACCT pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.842878 sshd[5635]: Accepted publickey for core from 10.200.16.10 port 53888 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:06.866827 kernel: audit: type=1101 audit(1734099066.841:1434): pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.866938 kernel: audit: type=1103 audit(1734099066.865:1435): pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.865000 audit[5635]: CRED_ACQ pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.867493 sshd[5635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:06.901050 kernel: audit: type=1006 audit(1734099066.866:1436): pid=5635 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:11:06.866000 audit[5635]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1bd5530 a2=3 a3=1 items=0 ppid=1 pid=5635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:06.905294 systemd-logind[1445]: New session 17 of user core. Dec 13 14:11:06.905894 systemd[1]: Started session-17.scope. Dec 13 14:11:06.923414 kernel: audit: type=1300 audit(1734099066.866:1436): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1bd5530 a2=3 a3=1 items=0 ppid=1 pid=5635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:06.866000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:06.930848 kernel: audit: type=1327 audit(1734099066.866:1436): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:06.910000 audit[5635]: USER_START pid=5635 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.955249 kernel: audit: type=1105 audit(1734099066.910:1437): pid=5635 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.912000 audit[5637]: CRED_ACQ pid=5637 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:06.975452 kernel: audit: type=1103 audit(1734099066.912:1438): pid=5637 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:07.258992 sshd[5635]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:07.259000 audit[5635]: USER_END pid=5635 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:07.259000 audit[5635]: CRED_DISP pid=5635 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:07.288209 systemd[1]: sshd@14-10.200.20.4:22-10.200.16.10:53888.service: Deactivated successfully. Dec 13 14:11:07.289051 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:11:07.310393 kernel: audit: type=1106 audit(1734099067.259:1439): pid=5635 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:07.310545 kernel: audit: type=1104 audit(1734099067.259:1440): pid=5635 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:07.310528 systemd-logind[1445]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:11:07.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.16.10:53888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:07.311620 systemd-logind[1445]: Removed session 17. Dec 13 14:11:08.443310 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.XjNqDy.mount: Deactivated successfully. Dec 13 14:11:12.327654 systemd[1]: Started sshd@15-10.200.20.4:22-10.200.16.10:42704.service. Dec 13 14:11:12.353495 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:12.353611 kernel: audit: type=1130 audit(1734099072.327:1442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.16.10:42704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:12.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.16.10:42704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:12.733000 audit[5668]: USER_ACCT pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.736242 sshd[5668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:12.743605 sshd[5668]: Accepted publickey for core from 10.200.16.10 port 42704 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:12.735000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.777324 kernel: audit: type=1101 audit(1734099072.733:1443): pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.777449 kernel: audit: type=1103 audit(1734099072.735:1444): pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.790667 kernel: audit: type=1006 audit(1734099072.735:1445): pid=5668 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:11:12.790931 kernel: audit: type=1300 audit(1734099072.735:1445): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2e76a90 a2=3 a3=1 items=0 ppid=1 pid=5668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:12.735000 audit[5668]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2e76a90 a2=3 a3=1 items=0 ppid=1 pid=5668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:12.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:12.816587 systemd[1]: Started session-18.scope. Dec 13 14:11:12.818015 systemd-logind[1445]: New session 18 of user core. Dec 13 14:11:12.820349 kernel: audit: type=1327 audit(1734099072.735:1445): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:12.822000 audit[5668]: USER_START pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.823000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.870431 kernel: audit: type=1105 audit(1734099072.822:1446): pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:12.870586 kernel: audit: type=1103 audit(1734099072.823:1447): pid=5673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.141677 sshd[5668]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:13.142000 audit[5668]: USER_END pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.145314 systemd-logind[1445]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:11:13.146562 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:11:13.147614 systemd-logind[1445]: Removed session 18. Dec 13 14:11:13.148252 systemd[1]: sshd@15-10.200.20.4:22-10.200.16.10:42704.service: Deactivated successfully. Dec 13 14:11:13.142000 audit[5668]: CRED_DISP pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.188076 kernel: audit: type=1106 audit(1734099073.142:1448): pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.188207 kernel: audit: type=1104 audit(1734099073.142:1449): pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.16.10:42704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:13.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.16.10:42712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:13.219226 systemd[1]: Started sshd@16-10.200.20.4:22-10.200.16.10:42712.service. Dec 13 14:11:13.659000 audit[5683]: USER_ACCT pid=5683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.660514 sshd[5683]: Accepted publickey for core from 10.200.16.10 port 42712 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:13.661000 audit[5683]: CRED_ACQ pid=5683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.661000 audit[5683]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4126d40 a2=3 a3=1 items=0 ppid=1 pid=5683 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:13.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:13.662167 sshd[5683]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:13.666820 systemd[1]: Started session-19.scope. Dec 13 14:11:13.667145 systemd-logind[1445]: New session 19 of user core. Dec 13 14:11:13.670000 audit[5683]: USER_START pid=5683 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:13.672000 audit[5685]: CRED_ACQ pid=5685 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:14.146208 sshd[5683]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:14.146000 audit[5683]: USER_END pid=5683 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:14.146000 audit[5683]: CRED_DISP pid=5683 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:14.149390 systemd[1]: sshd@16-10.200.20.4:22-10.200.16.10:42712.service: Deactivated successfully. Dec 13 14:11:14.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.16.10:42712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:14.150151 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:11:14.150590 systemd-logind[1445]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:11:14.151275 systemd-logind[1445]: Removed session 19. Dec 13 14:11:14.214504 systemd[1]: Started sshd@17-10.200.20.4:22-10.200.16.10:42722.service. Dec 13 14:11:14.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.16.10:42722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:14.641000 audit[5692]: USER_ACCT pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:14.642172 sshd[5692]: Accepted publickey for core from 10.200.16.10 port 42722 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:14.642000 audit[5692]: CRED_ACQ pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:14.642000 audit[5692]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdb3c860 a2=3 a3=1 items=0 ppid=1 pid=5692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:14.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:14.643977 sshd[5692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:14.648345 systemd[1]: Started session-20.scope. Dec 13 14:11:14.648932 systemd-logind[1445]: New session 20 of user core. Dec 13 14:11:14.653000 audit[5692]: USER_START pid=5692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:14.654000 audit[5694]: CRED_ACQ pid=5694 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:16.493000 audit[5704]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.493000 audit[5704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd8a84450 a2=0 a3=1 items=0 ppid=2715 pid=5704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.498000 audit[5704]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.498000 audit[5704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd8a84450 a2=0 a3=1 items=0 ppid=2715 pid=5704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.508000 audit[5706]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=5706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.508000 audit[5706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffda10da30 a2=0 a3=1 items=0 ppid=2715 pid=5706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.511000 audit[5706]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:16.511000 audit[5706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffda10da30 a2=0 a3=1 items=0 ppid=2715 pid=5706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:16.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:16.578302 sshd[5692]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:16.579000 audit[5692]: USER_END pid=5692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:16.579000 audit[5692]: CRED_DISP pid=5692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:16.581694 systemd-logind[1445]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:11:16.582033 systemd[1]: sshd@17-10.200.20.4:22-10.200.16.10:42722.service: Deactivated successfully. Dec 13 14:11:16.582847 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:11:16.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.16.10:42722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:16.583979 systemd-logind[1445]: Removed session 20. Dec 13 14:11:16.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.16.10:42726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:16.654936 systemd[1]: Started sshd@18-10.200.20.4:22-10.200.16.10:42726.service. Dec 13 14:11:17.093000 audit[5709]: USER_ACCT pid=5709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:17.094675 sshd[5709]: Accepted publickey for core from 10.200.16.10 port 42726 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:17.095000 audit[5709]: CRED_ACQ pid=5709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:17.095000 audit[5709]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4d513b0 a2=3 a3=1 items=0 ppid=1 pid=5709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:17.095000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:17.096505 sshd[5709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:17.101883 systemd[1]: Started session-21.scope. Dec 13 14:11:17.102370 systemd-logind[1445]: New session 21 of user core. Dec 13 14:11:17.106000 audit[5709]: USER_START pid=5709 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:17.107000 audit[5711]: CRED_ACQ pid=5711 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:17.422000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.428937 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:11:17.429089 kernel: audit: type=1400 audit(1734099077.422:1479): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.422000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c5cc0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.476567 kernel: audit: type=1300 audit(1734099077.422:1479): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c5cc0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.500024 kernel: audit: type=1327 audit(1734099077.422:1479): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.500188 kernel: audit: type=1400 audit(1734099077.422:1480): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.422000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.422000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c5ce0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.550239 kernel: audit: type=1300 audit(1734099077.422:1480): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c5ce0 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.572662 kernel: audit: type=1327 audit(1734099077.422:1480): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.422000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.593090 kernel: audit: type=1400 audit(1734099077.422:1481): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.422000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c5d00 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.621151 kernel: audit: type=1300 audit(1734099077.422:1481): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c5d00 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.643898 kernel: audit: type=1327 audit(1734099077.422:1481): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.432000 audit[2396]: AVC avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.665023 kernel: audit: type=1400 audit(1734099077.432:1482): avc: denied { watch } for pid=2396 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:11:17.432000 audit[2396]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400247aa40 a2=fc6 a3=0 items=0 ppid=2261 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c716,c923 key=(null) Dec 13 14:11:17.432000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:11:17.748437 sshd[5709]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:17.748000 audit[5709]: USER_END pid=5709 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:17.748000 audit[5709]: CRED_DISP pid=5709 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:17.751401 systemd-logind[1445]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:11:17.751574 systemd[1]: sshd@18-10.200.20.4:22-10.200.16.10:42726.service: Deactivated successfully. Dec 13 14:11:17.752312 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:11:17.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.16.10:42726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:17.753008 systemd-logind[1445]: Removed session 21. Dec 13 14:11:17.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.16.10:42740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:17.816663 systemd[1]: Started sshd@19-10.200.20.4:22-10.200.16.10:42740.service. Dec 13 14:11:17.896139 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.eY7Sgk.mount: Deactivated successfully. Dec 13 14:11:18.243000 audit[5719]: USER_ACCT pid=5719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:18.244191 sshd[5719]: Accepted publickey for core from 10.200.16.10 port 42740 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:18.244000 audit[5719]: CRED_ACQ pid=5719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:18.244000 audit[5719]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3862ba0 a2=3 a3=1 items=0 ppid=1 pid=5719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:18.244000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:18.245842 sshd[5719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:18.249618 systemd-logind[1445]: New session 22 of user core. Dec 13 14:11:18.250089 systemd[1]: Started session-22.scope. Dec 13 14:11:18.253000 audit[5719]: USER_START pid=5719 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:18.255000 audit[5745]: CRED_ACQ pid=5745 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:18.629599 sshd[5719]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:18.630000 audit[5719]: USER_END pid=5719 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:18.630000 audit[5719]: CRED_DISP pid=5719 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:18.633001 systemd[1]: sshd@19-10.200.20.4:22-10.200.16.10:42740.service: Deactivated successfully. Dec 13 14:11:18.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.16.10:42740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:18.633829 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:11:18.634441 systemd-logind[1445]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:11:18.635523 systemd-logind[1445]: Removed session 22. Dec 13 14:11:22.115000 audit[5756]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:22.115000 audit[5756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff28be2d0 a2=0 a3=1 items=0 ppid=2715 pid=5756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:22.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:22.121000 audit[5756]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:22.121000 audit[5756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff28be2d0 a2=0 a3=1 items=0 ppid=2715 pid=5756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:22.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:23.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.16.10:38120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:23.699146 systemd[1]: Started sshd@20-10.200.20.4:22-10.200.16.10:38120.service. Dec 13 14:11:23.704031 kernel: kauditd_printk_skb: 22 callbacks suppressed Dec 13 14:11:23.704158 kernel: audit: type=1130 audit(1734099083.698:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.16.10:38120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:24.107000 audit[5759]: USER_ACCT pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.110951 sshd[5759]: Accepted publickey for core from 10.200.16.10 port 38120 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:24.131788 kernel: audit: type=1101 audit(1734099084.107:1498): pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.131000 audit[5759]: CRED_ACQ pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.132535 sshd[5759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:24.138156 systemd[1]: Started session-23.scope. Dec 13 14:11:24.139569 systemd-logind[1445]: New session 23 of user core. Dec 13 14:11:24.154812 kernel: audit: type=1103 audit(1734099084.131:1499): pid=5759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.154933 kernel: audit: type=1006 audit(1734099084.131:1500): pid=5759 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:11:24.131000 audit[5759]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0426ce0 a2=3 a3=1 items=0 ppid=1 pid=5759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:24.190991 kernel: audit: type=1300 audit(1734099084.131:1500): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0426ce0 a2=3 a3=1 items=0 ppid=1 pid=5759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:24.191112 kernel: audit: type=1327 audit(1734099084.131:1500): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:24.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:24.198708 kernel: audit: type=1105 audit(1734099084.143:1501): pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.143000 audit[5759]: USER_START pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.145000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.242929 kernel: audit: type=1103 audit(1734099084.145:1502): pid=5761 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.509157 sshd[5759]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:24.509000 audit[5759]: USER_END pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.511996 systemd-logind[1445]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:11:24.513252 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:11:24.514347 systemd-logind[1445]: Removed session 23. Dec 13 14:11:24.515046 systemd[1]: sshd@20-10.200.20.4:22-10.200.16.10:38120.service: Deactivated successfully. Dec 13 14:11:24.509000 audit[5759]: CRED_DISP pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.555578 kernel: audit: type=1106 audit(1734099084.509:1503): pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.555837 kernel: audit: type=1104 audit(1734099084.509:1504): pid=5759 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:24.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.16.10:38120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:29.580959 systemd[1]: Started sshd@21-10.200.20.4:22-10.200.16.10:37034.service. Dec 13 14:11:29.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.16.10:37034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:29.586849 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:29.586962 kernel: audit: type=1130 audit(1734099089.580:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.16.10:37034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:30.008000 audit[5771]: USER_ACCT pid=5771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.012912 sshd[5771]: Accepted publickey for core from 10.200.16.10 port 37034 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:30.016485 sshd[5771]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:30.015000 audit[5771]: CRED_ACQ pid=5771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.056326 kernel: audit: type=1101 audit(1734099090.008:1507): pid=5771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.056435 kernel: audit: type=1103 audit(1734099090.015:1508): pid=5771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.060137 systemd[1]: Started session-24.scope. Dec 13 14:11:30.061500 systemd-logind[1445]: New session 24 of user core. Dec 13 14:11:30.073500 kernel: audit: type=1006 audit(1734099090.015:1509): pid=5771 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:11:30.015000 audit[5771]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeef74f0 a2=3 a3=1 items=0 ppid=1 pid=5771 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:30.099010 kernel: audit: type=1300 audit(1734099090.015:1509): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeef74f0 a2=3 a3=1 items=0 ppid=1 pid=5771 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:30.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:30.107960 kernel: audit: type=1327 audit(1734099090.015:1509): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:30.065000 audit[5771]: USER_START pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.133256 kernel: audit: type=1105 audit(1734099090.065:1510): pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.071000 audit[5773]: CRED_ACQ pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.155755 kernel: audit: type=1103 audit(1734099090.071:1511): pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.406341 sshd[5771]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:30.406000 audit[5771]: USER_END pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.410974 systemd-logind[1445]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:11:30.412462 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:11:30.413993 systemd-logind[1445]: Removed session 24. Dec 13 14:11:30.414871 systemd[1]: sshd@21-10.200.20.4:22-10.200.16.10:37034.service: Deactivated successfully. Dec 13 14:11:30.407000 audit[5771]: CRED_DISP pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.453984 kernel: audit: type=1106 audit(1734099090.406:1512): pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.454112 kernel: audit: type=1104 audit(1734099090.407:1513): pid=5771 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:30.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.16.10:37034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:32.745062 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.FXJcX6.mount: Deactivated successfully. Dec 13 14:11:35.479050 systemd[1]: Started sshd@22-10.200.20.4:22-10.200.16.10:37040.service. Dec 13 14:11:35.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.16.10:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:35.485587 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:35.485758 kernel: audit: type=1130 audit(1734099095.478:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.16.10:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:35.909000 audit[5810]: USER_ACCT pid=5810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:35.910691 sshd[5810]: Accepted publickey for core from 10.200.16.10 port 37040 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:35.933754 kernel: audit: type=1101 audit(1734099095.909:1516): pid=5810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:35.933000 audit[5810]: CRED_ACQ pid=5810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:35.935185 sshd[5810]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:35.969551 kernel: audit: type=1103 audit(1734099095.933:1517): pid=5810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:35.969706 kernel: audit: type=1006 audit(1734099095.934:1518): pid=5810 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:11:35.934000 audit[5810]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd44ce8f0 a2=3 a3=1 items=0 ppid=1 pid=5810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:35.992730 kernel: audit: type=1300 audit(1734099095.934:1518): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd44ce8f0 a2=3 a3=1 items=0 ppid=1 pid=5810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:35.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:36.001971 kernel: audit: type=1327 audit(1734099095.934:1518): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:36.002946 systemd-logind[1445]: New session 25 of user core. Dec 13 14:11:36.003408 systemd[1]: Started session-25.scope. Dec 13 14:11:36.008000 audit[5810]: USER_START pid=5810 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.034351 kernel: audit: type=1105 audit(1734099096.008:1519): pid=5810 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.034452 kernel: audit: type=1103 audit(1734099096.033:1520): pid=5812 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.033000 audit[5812]: CRED_ACQ pid=5812 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.356233 sshd[5810]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:36.356000 audit[5810]: USER_END pid=5810 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.357000 audit[5810]: CRED_DISP pid=5810 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.382408 systemd[1]: sshd@22-10.200.20.4:22-10.200.16.10:37040.service: Deactivated successfully. Dec 13 14:11:36.383277 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:11:36.402194 kernel: audit: type=1106 audit(1734099096.356:1521): pid=5810 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.402322 kernel: audit: type=1104 audit(1734099096.357:1522): pid=5810 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:36.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.16.10:37040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:36.402767 systemd-logind[1445]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:11:36.403689 systemd-logind[1445]: Removed session 25. Dec 13 14:11:38.442047 systemd[1]: run-containerd-runc-k8s.io-2db4e7cd7fac24d6a04f791708d8ab3aa07c668eb0966fb8605fb2b2dd4b3fd2-runc.dSfB8v.mount: Deactivated successfully. Dec 13 14:11:41.429982 systemd[1]: Started sshd@23-10.200.20.4:22-10.200.16.10:45992.service. Dec 13 14:11:41.437802 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:41.438045 kernel: audit: type=1130 audit(1734099101.429:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.16.10:45992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:41.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.16.10:45992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:41.840000 audit[5841]: USER_ACCT pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.844923 sshd[5841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:41.845512 sshd[5841]: Accepted publickey for core from 10.200.16.10 port 45992 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:41.842000 audit[5841]: CRED_ACQ pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.888857 kernel: audit: type=1101 audit(1734099101.840:1525): pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.888974 kernel: audit: type=1103 audit(1734099101.842:1526): pid=5841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.902191 kernel: audit: type=1006 audit(1734099101.842:1527): pid=5841 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:11:41.842000 audit[5841]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff80712d0 a2=3 a3=1 items=0 ppid=1 pid=5841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:41.925402 kernel: audit: type=1300 audit(1734099101.842:1527): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff80712d0 a2=3 a3=1 items=0 ppid=1 pid=5841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:41.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:41.934361 kernel: audit: type=1327 audit(1734099101.842:1527): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:41.936937 systemd-logind[1445]: New session 26 of user core. Dec 13 14:11:41.937420 systemd[1]: Started session-26.scope. Dec 13 14:11:41.940000 audit[5841]: USER_START pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.964000 audit[5843]: CRED_ACQ pid=5843 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.986498 kernel: audit: type=1105 audit(1734099101.940:1528): pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:41.986593 kernel: audit: type=1103 audit(1734099101.964:1529): pid=5843 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:42.283966 sshd[5841]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:42.283000 audit[5841]: USER_END pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:42.311805 systemd[1]: sshd@23-10.200.20.4:22-10.200.16.10:45992.service: Deactivated successfully. Dec 13 14:11:42.284000 audit[5841]: CRED_DISP pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:42.333478 kernel: audit: type=1106 audit(1734099102.283:1530): pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:42.333623 kernel: audit: type=1104 audit(1734099102.284:1531): pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:42.312592 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:11:42.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.16.10:45992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:42.333934 systemd-logind[1445]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:11:42.334848 systemd-logind[1445]: Removed session 26. Dec 13 14:11:47.384530 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:47.384707 kernel: audit: type=1130 audit(1734099107.357:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.16.10:45996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:47.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.16.10:45996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:47.358989 systemd[1]: Started sshd@24-10.200.20.4:22-10.200.16.10:45996.service. Dec 13 14:11:47.785000 audit[5857]: USER_ACCT pid=5857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.789368 sshd[5857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:47.790296 sshd[5857]: Accepted publickey for core from 10.200.16.10 port 45996 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:47.787000 audit[5857]: CRED_ACQ pid=5857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.832946 kernel: audit: type=1101 audit(1734099107.785:1534): pid=5857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.833146 kernel: audit: type=1103 audit(1734099107.787:1535): pid=5857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.834015 kernel: audit: type=1006 audit(1734099107.787:1536): pid=5857 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:11:47.787000 audit[5857]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff829b8d0 a2=3 a3=1 items=0 ppid=1 pid=5857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:47.871207 kernel: audit: type=1300 audit(1734099107.787:1536): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff829b8d0 a2=3 a3=1 items=0 ppid=1 pid=5857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:47.873303 systemd-logind[1445]: New session 27 of user core. Dec 13 14:11:47.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:47.873775 systemd[1]: Started session-27.scope. Dec 13 14:11:47.881992 kernel: audit: type=1327 audit(1734099107.787:1536): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:47.886000 audit[5857]: USER_START pid=5857 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.888000 audit[5865]: CRED_ACQ pid=5865 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.924979 systemd[1]: run-containerd-runc-k8s.io-2baf0dad878ef1bdc23dc8ba4d5fe06a05d503e0157fd41fa58cde0aaafdd09d-runc.9pWsVH.mount: Deactivated successfully. Dec 13 14:11:47.933993 kernel: audit: type=1105 audit(1734099107.886:1537): pid=5857 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:47.934206 kernel: audit: type=1103 audit(1734099107.888:1538): pid=5865 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:48.216834 sshd[5857]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:48.216000 audit[5857]: USER_END pid=5857 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:48.220473 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:11:48.221268 systemd[1]: sshd@24-10.200.20.4:22-10.200.16.10:45996.service: Deactivated successfully. Dec 13 14:11:48.217000 audit[5857]: CRED_DISP pid=5857 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:48.265231 kernel: audit: type=1106 audit(1734099108.216:1539): pid=5857 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:48.265373 kernel: audit: type=1104 audit(1734099108.217:1540): pid=5857 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:48.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.16.10:45996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:48.266109 systemd-logind[1445]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:11:48.267047 systemd-logind[1445]: Removed session 27. Dec 13 14:11:53.283881 systemd[1]: Started sshd@25-10.200.20.4:22-10.200.16.10:41354.service. Dec 13 14:11:53.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.16.10:41354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:53.289789 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:53.289909 kernel: audit: type=1130 audit(1734099113.282:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.16.10:41354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:53.703403 sshd[5892]: Accepted publickey for core from 10.200.16.10 port 41354 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:53.701000 audit[5892]: USER_ACCT pid=5892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.725000 audit[5892]: CRED_ACQ pid=5892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.749009 kernel: audit: type=1101 audit(1734099113.701:1543): pid=5892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.749119 kernel: audit: type=1103 audit(1734099113.725:1544): pid=5892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.727535 sshd[5892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:53.763685 kernel: audit: type=1006 audit(1734099113.725:1545): pid=5892 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:11:53.725000 audit[5892]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb8ac190 a2=3 a3=1 items=0 ppid=1 pid=5892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:53.787840 kernel: audit: type=1300 audit(1734099113.725:1545): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb8ac190 a2=3 a3=1 items=0 ppid=1 pid=5892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:53.725000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:53.796024 kernel: audit: type=1327 audit(1734099113.725:1545): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:53.798965 systemd[1]: Started session-28.scope. Dec 13 14:11:53.799126 systemd-logind[1445]: New session 28 of user core. Dec 13 14:11:53.802000 audit[5892]: USER_START pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.828000 audit[5894]: CRED_ACQ pid=5894 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.850400 kernel: audit: type=1105 audit(1734099113.802:1546): pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:53.850502 kernel: audit: type=1103 audit(1734099113.828:1547): pid=5894 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:54.147974 sshd[5892]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:54.147000 audit[5892]: USER_END pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:54.151080 systemd-logind[1445]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:11:54.152265 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:11:54.153453 systemd-logind[1445]: Removed session 28. Dec 13 14:11:54.153975 systemd[1]: sshd@25-10.200.20.4:22-10.200.16.10:41354.service: Deactivated successfully. Dec 13 14:11:54.147000 audit[5892]: CRED_DISP pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:54.194763 kernel: audit: type=1106 audit(1734099114.147:1548): pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:54.194873 kernel: audit: type=1104 audit(1734099114.147:1549): pid=5892 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:54.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.16.10:41354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'