Dec 13 06:21:37.893441 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 06:21:37.893466 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 06:21:37.893479 kernel: BIOS-provided physical RAM map: Dec 13 06:21:37.893486 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 06:21:37.893493 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 06:21:37.893500 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 06:21:37.893516 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 06:21:37.893524 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 06:21:37.893531 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 06:21:37.893538 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 06:21:37.893548 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 06:21:37.893555 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 06:21:37.893562 kernel: NX (Execute Disable) protection: active Dec 13 06:21:37.893569 kernel: SMBIOS 2.8 present. Dec 13 06:21:37.893579 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 06:21:37.893587 kernel: Hypervisor detected: KVM Dec 13 06:21:37.893597 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 06:21:37.893604 kernel: kvm-clock: cpu 0, msr 1619b001, primary cpu clock Dec 13 06:21:37.893612 kernel: kvm-clock: using sched offset of 4221603156 cycles Dec 13 06:21:37.893621 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 06:21:37.893629 kernel: tsc: Detected 2294.608 MHz processor Dec 13 06:21:37.893637 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 06:21:37.893645 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 06:21:37.893661 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 06:21:37.893669 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 06:21:37.893679 kernel: Using GB pages for direct mapping Dec 13 06:21:37.893687 kernel: ACPI: Early table checksum verification disabled Dec 13 06:21:37.893695 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 06:21:37.893716 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894751 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894769 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894777 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 06:21:37.894785 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894793 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894805 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894813 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 06:21:37.894821 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 06:21:37.894828 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 06:21:37.894836 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 06:21:37.894844 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 06:21:37.894857 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 06:21:37.894868 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 06:21:37.894876 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 06:21:37.894885 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 06:21:37.894893 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 06:21:37.894902 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 06:21:37.894910 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 06:21:37.894919 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 06:21:37.894929 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 06:21:37.894938 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 06:21:37.894946 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 06:21:37.894955 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 06:21:37.894963 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 06:21:37.894972 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 06:21:37.894980 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 06:21:37.894988 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 06:21:37.894997 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 06:21:37.895005 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 06:21:37.895016 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 06:21:37.895024 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 06:21:37.895033 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 06:21:37.895042 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 06:21:37.895051 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 06:21:37.895060 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 06:21:37.895069 kernel: Zone ranges: Dec 13 06:21:37.895077 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 06:21:37.895086 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 06:21:37.895097 kernel: Normal empty Dec 13 06:21:37.895106 kernel: Movable zone start for each node Dec 13 06:21:37.895114 kernel: Early memory node ranges Dec 13 06:21:37.895123 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 06:21:37.895131 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 06:21:37.895140 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 06:21:37.895148 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 06:21:37.895157 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 06:21:37.895165 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 06:21:37.895176 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 06:21:37.895185 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 06:21:37.895194 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 06:21:37.895202 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 06:21:37.895211 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 06:21:37.895220 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 06:21:37.895228 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 06:21:37.895237 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 06:21:37.895245 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 06:21:37.895256 kernel: TSC deadline timer available Dec 13 06:21:37.895265 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 06:21:37.895273 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 06:21:37.895282 kernel: Booting paravirtualized kernel on KVM Dec 13 06:21:37.895291 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 06:21:37.895299 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 06:21:37.895308 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 06:21:37.895317 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 06:21:37.895325 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 06:21:37.895336 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 06:21:37.895345 kernel: kvm-guest: PV spinlocks enabled Dec 13 06:21:37.895353 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 06:21:37.895362 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 06:21:37.895370 kernel: Policy zone: DMA32 Dec 13 06:21:37.895380 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 06:21:37.895389 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 06:21:37.895398 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 06:21:37.895409 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 06:21:37.895418 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 06:21:37.895427 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 192524K reserved, 0K cma-reserved) Dec 13 06:21:37.895436 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 06:21:37.895444 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 06:21:37.895453 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 06:21:37.895461 kernel: rcu: Hierarchical RCU implementation. Dec 13 06:21:37.895471 kernel: rcu: RCU event tracing is enabled. Dec 13 06:21:37.895480 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 06:21:37.895491 kernel: Rude variant of Tasks RCU enabled. Dec 13 06:21:37.895509 kernel: Tracing variant of Tasks RCU enabled. Dec 13 06:21:37.895518 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 06:21:37.895527 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 06:21:37.895536 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 06:21:37.895549 kernel: random: crng init done Dec 13 06:21:37.895558 kernel: Console: colour VGA+ 80x25 Dec 13 06:21:37.895577 kernel: printk: console [tty0] enabled Dec 13 06:21:37.895586 kernel: printk: console [ttyS0] enabled Dec 13 06:21:37.895596 kernel: ACPI: Core revision 20210730 Dec 13 06:21:37.895605 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 06:21:37.895614 kernel: x2apic enabled Dec 13 06:21:37.895625 kernel: Switched APIC routing to physical x2apic. Dec 13 06:21:37.895635 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Dec 13 06:21:37.895644 kernel: Calibrating delay loop (skipped) preset value.. 4589.21 BogoMIPS (lpj=2294608) Dec 13 06:21:37.895653 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 06:21:37.895663 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 06:21:37.895674 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 06:21:37.895683 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 06:21:37.895692 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 06:21:37.895701 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 06:21:37.895725 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 06:21:37.895734 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 06:21:37.895743 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 06:21:37.895752 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 06:21:37.895767 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 06:21:37.895777 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 06:21:37.895789 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 06:21:37.895798 kernel: TAA: Mitigation: Clear CPU buffers Dec 13 06:21:37.895807 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 06:21:37.895816 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 06:21:37.895826 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 06:21:37.895835 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 06:21:37.895844 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 06:21:37.895853 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 06:21:37.895862 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 06:21:37.895871 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 06:21:37.895880 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 06:21:37.895891 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 06:21:37.895900 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 06:21:37.895910 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 06:21:37.895919 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 06:21:37.895928 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Dec 13 06:21:37.895937 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Dec 13 06:21:37.895946 kernel: Freeing SMP alternatives memory: 32K Dec 13 06:21:37.895955 kernel: pid_max: default: 32768 minimum: 301 Dec 13 06:21:37.895964 kernel: LSM: Security Framework initializing Dec 13 06:21:37.895973 kernel: SELinux: Initializing. Dec 13 06:21:37.895982 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 06:21:37.895991 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 06:21:37.896002 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Dec 13 06:21:37.896011 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 06:21:37.896021 kernel: signal: max sigframe size: 3632 Dec 13 06:21:37.896030 kernel: rcu: Hierarchical SRCU implementation. Dec 13 06:21:37.896039 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 06:21:37.896048 kernel: smp: Bringing up secondary CPUs ... Dec 13 06:21:37.896058 kernel: x86: Booting SMP configuration: Dec 13 06:21:37.896067 kernel: .... node #0, CPUs: #1 Dec 13 06:21:37.896076 kernel: kvm-clock: cpu 1, msr 1619b041, secondary cpu clock Dec 13 06:21:37.896087 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 06:21:37.896096 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 06:21:37.896105 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 06:21:37.896115 kernel: smpboot: Max logical packages: 16 Dec 13 06:21:37.896124 kernel: smpboot: Total of 2 processors activated (9178.43 BogoMIPS) Dec 13 06:21:37.896133 kernel: devtmpfs: initialized Dec 13 06:21:37.896142 kernel: x86/mm: Memory block size: 128MB Dec 13 06:21:37.896151 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 06:21:37.896161 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 06:21:37.902723 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 06:21:37.902736 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 06:21:37.902746 kernel: audit: initializing netlink subsys (disabled) Dec 13 06:21:37.902755 kernel: audit: type=2000 audit(1734070896.860:1): state=initialized audit_enabled=0 res=1 Dec 13 06:21:37.902769 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 06:21:37.902779 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 06:21:37.902788 kernel: cpuidle: using governor menu Dec 13 06:21:37.902797 kernel: ACPI: bus type PCI registered Dec 13 06:21:37.902806 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 06:21:37.902815 kernel: dca service started, version 1.12.1 Dec 13 06:21:37.902829 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 06:21:37.902839 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 06:21:37.902848 kernel: PCI: Using configuration type 1 for base access Dec 13 06:21:37.902868 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 06:21:37.902878 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 06:21:37.902888 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 06:21:37.902897 kernel: ACPI: Added _OSI(Module Device) Dec 13 06:21:37.902906 kernel: ACPI: Added _OSI(Processor Device) Dec 13 06:21:37.902915 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 06:21:37.902928 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 06:21:37.902937 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 06:21:37.902947 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 06:21:37.902956 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 06:21:37.902965 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 06:21:37.902974 kernel: ACPI: Interpreter enabled Dec 13 06:21:37.902983 kernel: ACPI: PM: (supports S0 S5) Dec 13 06:21:37.902993 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 06:21:37.903002 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 06:21:37.903014 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 06:21:37.903031 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 06:21:37.903231 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 06:21:37.903340 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 06:21:37.903442 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 06:21:37.903462 kernel: PCI host bridge to bus 0000:00 Dec 13 06:21:37.903575 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 06:21:37.903677 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 06:21:37.903781 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 06:21:37.903855 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 06:21:37.903928 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 06:21:37.904002 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 06:21:37.904077 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 06:21:37.904181 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 06:21:37.904282 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 06:21:37.904369 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 06:21:37.904457 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 06:21:37.904546 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 06:21:37.904633 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 06:21:37.904741 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.904845 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 06:21:37.904940 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.905030 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 06:21:37.905121 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.905206 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 06:21:37.905300 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.905391 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 06:21:37.905488 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.905572 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 06:21:37.905658 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.905758 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 06:21:37.905857 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.905946 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 06:21:37.906039 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 06:21:37.906169 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 06:21:37.906290 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 06:21:37.906387 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 06:21:37.906496 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 06:21:37.906599 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 06:21:37.906691 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 06:21:37.906817 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 06:21:37.906901 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 06:21:37.906983 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 06:21:37.907065 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 06:21:37.907159 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 06:21:37.907245 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 06:21:37.907345 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 06:21:37.907431 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 06:21:37.907514 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 06:21:37.907607 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 06:21:37.907690 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 06:21:37.907806 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 06:21:37.907898 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 06:21:37.907983 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 06:21:37.908066 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 06:21:37.908152 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 06:21:37.908250 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 06:21:37.908351 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 06:21:37.908448 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 06:21:37.908534 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 06:21:37.908624 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 06:21:37.908730 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 06:21:37.908826 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 06:21:37.908916 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 06:21:37.909004 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 06:21:37.909094 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 06:21:37.909190 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 06:21:37.909279 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 06:21:37.909367 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 06:21:37.909454 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 06:21:37.909536 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 06:21:37.909625 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 06:21:37.909720 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 06:21:37.909819 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 06:21:37.909903 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 06:21:37.909988 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 06:21:37.910073 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 06:21:37.910162 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 06:21:37.910245 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 06:21:37.910329 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 06:21:37.910413 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 06:21:37.910503 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 06:21:37.910589 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 06:21:37.910675 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 06:21:37.910774 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 06:21:37.910858 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 06:21:37.910870 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 06:21:37.910880 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 06:21:37.910889 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 06:21:37.910902 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 06:21:37.910911 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 06:21:37.910920 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 06:21:37.910929 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 06:21:37.910938 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 06:21:37.910947 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 06:21:37.910957 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 06:21:37.910966 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 06:21:37.910975 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 06:21:37.910987 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 06:21:37.910996 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 06:21:37.911006 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 06:21:37.911015 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 06:21:37.911024 kernel: iommu: Default domain type: Translated Dec 13 06:21:37.911033 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 06:21:37.911115 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 06:21:37.911231 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 06:21:37.918841 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 06:21:37.918885 kernel: vgaarb: loaded Dec 13 06:21:37.918898 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 06:21:37.918909 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 06:21:37.918918 kernel: PTP clock support registered Dec 13 06:21:37.918928 kernel: PCI: Using ACPI for IRQ routing Dec 13 06:21:37.918938 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 06:21:37.918948 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 06:21:37.918958 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 06:21:37.918975 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 06:21:37.918984 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 06:21:37.918994 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 06:21:37.919004 kernel: pnp: PnP ACPI init Dec 13 06:21:37.919144 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 06:21:37.919159 kernel: pnp: PnP ACPI: found 5 devices Dec 13 06:21:37.919169 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 06:21:37.919179 kernel: NET: Registered PF_INET protocol family Dec 13 06:21:37.919193 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 06:21:37.919203 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 06:21:37.919212 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 06:21:37.919222 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 06:21:37.919231 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 06:21:37.919241 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 06:21:37.919251 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 06:21:37.919260 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 06:21:37.919270 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 06:21:37.919283 kernel: NET: Registered PF_XDP protocol family Dec 13 06:21:37.919389 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 06:21:37.919492 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 06:21:37.919591 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 06:21:37.919690 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 06:21:37.919806 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 06:21:37.919904 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 06:21:37.920006 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 06:21:37.920103 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 06:21:37.920196 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 06:21:37.920287 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 06:21:37.920378 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 06:21:37.920472 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 06:21:37.920586 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 06:21:37.920682 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 06:21:37.920791 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 06:21:37.920884 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 06:21:37.920990 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 06:21:37.921087 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 06:21:37.921181 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 06:21:37.921273 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 06:21:37.921370 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 06:21:37.921464 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 06:21:37.921555 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 06:21:37.921647 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 06:21:37.925841 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 06:21:37.925967 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 06:21:37.926066 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 06:21:37.926152 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 06:21:37.926238 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 06:21:37.926321 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 06:21:37.926409 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 06:21:37.926493 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 06:21:37.926577 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 06:21:37.926659 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 06:21:37.926754 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 06:21:37.926852 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 06:21:37.926936 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 06:21:37.927020 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 06:21:37.927108 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 06:21:37.927191 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 06:21:37.927275 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 06:21:37.927358 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 06:21:37.927445 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 06:21:37.927537 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 06:21:37.927623 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 06:21:37.927715 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 06:21:37.927813 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 06:21:37.927906 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 06:21:37.927992 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 06:21:37.928081 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 06:21:37.928168 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 06:21:37.928246 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 06:21:37.928323 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 06:21:37.928400 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 06:21:37.928475 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 06:21:37.928549 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 06:21:37.928648 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 06:21:37.928755 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 06:21:37.928845 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 06:21:37.928937 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 06:21:37.929035 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 06:21:37.929116 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 06:21:37.929197 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 06:21:37.929293 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 06:21:37.929378 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 06:21:37.929466 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 06:21:37.929554 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 06:21:37.929636 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 06:21:37.936820 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 06:21:37.936955 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 06:21:37.937048 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 06:21:37.937138 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 06:21:37.937223 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 06:21:37.937297 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 06:21:37.937368 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 06:21:37.937449 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 06:21:37.937521 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 06:21:37.937595 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 06:21:37.937674 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 06:21:37.937765 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 06:21:37.937863 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 06:21:37.937877 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 06:21:37.937888 kernel: PCI: CLS 0 bytes, default 64 Dec 13 06:21:37.937899 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 06:21:37.937910 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 06:21:37.937924 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 06:21:37.937934 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Dec 13 06:21:37.937945 kernel: Initialise system trusted keyrings Dec 13 06:21:37.937955 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 06:21:37.937965 kernel: Key type asymmetric registered Dec 13 06:21:37.937975 kernel: Asymmetric key parser 'x509' registered Dec 13 06:21:37.937985 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 06:21:37.937996 kernel: io scheduler mq-deadline registered Dec 13 06:21:37.938006 kernel: io scheduler kyber registered Dec 13 06:21:37.938019 kernel: io scheduler bfq registered Dec 13 06:21:37.938115 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 06:21:37.938206 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 06:21:37.938301 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.938396 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 06:21:37.938483 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 06:21:37.938570 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.938669 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 06:21:37.938769 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 06:21:37.938856 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.938945 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 06:21:37.939031 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 06:21:37.939116 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.939207 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 06:21:37.939292 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 06:21:37.939377 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.939470 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 06:21:37.939560 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 06:21:37.939648 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.941824 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 06:21:37.941939 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 06:21:37.942028 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.942121 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 06:21:37.942208 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 06:21:37.942295 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 06:21:37.942315 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 06:21:37.942326 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 06:21:37.942337 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 06:21:37.942347 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 06:21:37.942358 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 06:21:37.942371 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 06:21:37.942382 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 06:21:37.942393 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 06:21:37.942406 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 06:21:37.942501 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 06:21:37.942582 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 06:21:37.942662 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T06:21:37 UTC (1734070897) Dec 13 06:21:37.942753 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 06:21:37.942773 kernel: intel_pstate: CPU model not supported Dec 13 06:21:37.942784 kernel: NET: Registered PF_INET6 protocol family Dec 13 06:21:37.942798 kernel: Segment Routing with IPv6 Dec 13 06:21:37.942809 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 06:21:37.942819 kernel: NET: Registered PF_PACKET protocol family Dec 13 06:21:37.942829 kernel: Key type dns_resolver registered Dec 13 06:21:37.942840 kernel: IPI shorthand broadcast: enabled Dec 13 06:21:37.942850 kernel: sched_clock: Marking stable (742162584, 118850162)->(1062954918, -201942172) Dec 13 06:21:37.942860 kernel: registered taskstats version 1 Dec 13 06:21:37.942871 kernel: Loading compiled-in X.509 certificates Dec 13 06:21:37.942881 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 06:21:37.942891 kernel: Key type .fscrypt registered Dec 13 06:21:37.942904 kernel: Key type fscrypt-provisioning registered Dec 13 06:21:37.942915 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 06:21:37.942925 kernel: ima: Allocated hash algorithm: sha1 Dec 13 06:21:37.942935 kernel: ima: No architecture policies found Dec 13 06:21:37.942946 kernel: clk: Disabling unused clocks Dec 13 06:21:37.942956 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 06:21:37.942967 kernel: Write protecting the kernel read-only data: 28672k Dec 13 06:21:37.942977 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 06:21:37.942990 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 06:21:37.943000 kernel: Run /init as init process Dec 13 06:21:37.943010 kernel: with arguments: Dec 13 06:21:37.943021 kernel: /init Dec 13 06:21:37.943031 kernel: with environment: Dec 13 06:21:37.943040 kernel: HOME=/ Dec 13 06:21:37.943050 kernel: TERM=linux Dec 13 06:21:37.943060 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 06:21:37.943074 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 06:21:37.943091 systemd[1]: Detected virtualization kvm. Dec 13 06:21:37.943102 systemd[1]: Detected architecture x86-64. Dec 13 06:21:37.943112 systemd[1]: Running in initrd. Dec 13 06:21:37.943122 systemd[1]: No hostname configured, using default hostname. Dec 13 06:21:37.943132 systemd[1]: Hostname set to . Dec 13 06:21:37.943143 systemd[1]: Initializing machine ID from VM UUID. Dec 13 06:21:37.943154 systemd[1]: Queued start job for default target initrd.target. Dec 13 06:21:37.943164 systemd[1]: Started systemd-ask-password-console.path. Dec 13 06:21:37.943177 systemd[1]: Reached target cryptsetup.target. Dec 13 06:21:37.943188 systemd[1]: Reached target paths.target. Dec 13 06:21:37.943198 systemd[1]: Reached target slices.target. Dec 13 06:21:37.943209 systemd[1]: Reached target swap.target. Dec 13 06:21:37.943219 systemd[1]: Reached target timers.target. Dec 13 06:21:37.943230 systemd[1]: Listening on iscsid.socket. Dec 13 06:21:37.943240 systemd[1]: Listening on iscsiuio.socket. Dec 13 06:21:37.943254 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 06:21:37.943265 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 06:21:37.943276 systemd[1]: Listening on systemd-journald.socket. Dec 13 06:21:37.943286 systemd[1]: Listening on systemd-networkd.socket. Dec 13 06:21:37.943297 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 06:21:37.943307 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 06:21:37.943318 systemd[1]: Reached target sockets.target. Dec 13 06:21:37.943331 systemd[1]: Starting kmod-static-nodes.service... Dec 13 06:21:37.943342 systemd[1]: Finished network-cleanup.service. Dec 13 06:21:37.943355 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 06:21:37.943366 systemd[1]: Starting systemd-journald.service... Dec 13 06:21:37.943376 systemd[1]: Starting systemd-modules-load.service... Dec 13 06:21:37.943386 systemd[1]: Starting systemd-resolved.service... Dec 13 06:21:37.943397 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 06:21:37.943408 systemd[1]: Finished kmod-static-nodes.service. Dec 13 06:21:37.943418 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 06:21:37.943429 kernel: audit: type=1130 audit(1734070897.893:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.943440 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 06:21:37.943461 systemd-journald[201]: Journal started Dec 13 06:21:37.943523 systemd-journald[201]: Runtime Journal (/run/log/journal/c5c302a38521448e8e2bb79c85205f1f) is 4.7M, max 38.1M, 33.3M free. Dec 13 06:21:37.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.921950 systemd-modules-load[202]: Inserted module 'overlay' Dec 13 06:21:37.952008 systemd[1]: Started systemd-resolved.service. Dec 13 06:21:37.952050 kernel: audit: type=1130 audit(1734070897.947:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.952068 systemd[1]: Started systemd-journald.service. Dec 13 06:21:37.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.932696 systemd-resolved[203]: Positive Trust Anchors: Dec 13 06:21:37.966826 kernel: audit: type=1130 audit(1734070897.951:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.966908 kernel: audit: type=1130 audit(1734070897.954:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.932721 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 06:21:37.975393 kernel: audit: type=1130 audit(1734070897.963:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.932766 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 06:21:37.979611 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 06:21:37.940614 systemd-resolved[203]: Defaulting to hostname 'linux'. Dec 13 06:21:37.952538 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 06:21:37.955909 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 06:21:37.964162 systemd[1]: Reached target nss-lookup.target. Dec 13 06:21:37.974200 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 06:21:37.993759 kernel: Bridge firewalling registered Dec 13 06:21:37.985879 systemd-modules-load[202]: Inserted module 'br_netfilter' Dec 13 06:21:37.994635 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 06:21:38.000751 kernel: audit: type=1130 audit(1734070897.994:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:37.998263 systemd[1]: Starting dracut-cmdline.service... Dec 13 06:21:38.008550 dracut-cmdline[220]: dracut-dracut-053 Dec 13 06:21:38.010724 kernel: SCSI subsystem initialized Dec 13 06:21:38.011488 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 06:21:38.026473 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 06:21:38.026496 kernel: device-mapper: uevent: version 1.0.3 Dec 13 06:21:38.026510 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 06:21:38.035166 kernel: audit: type=1130 audit(1734070898.027:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.026942 systemd-modules-load[202]: Inserted module 'dm_multipath' Dec 13 06:21:38.027663 systemd[1]: Finished systemd-modules-load.service. Dec 13 06:21:38.028958 systemd[1]: Starting systemd-sysctl.service... Dec 13 06:21:38.039881 systemd[1]: Finished systemd-sysctl.service. Dec 13 06:21:38.043523 kernel: audit: type=1130 audit(1734070898.039:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.108776 kernel: Loading iSCSI transport class v2.0-870. Dec 13 06:21:38.128795 kernel: iscsi: registered transport (tcp) Dec 13 06:21:38.154064 kernel: iscsi: registered transport (qla4xxx) Dec 13 06:21:38.154205 kernel: QLogic iSCSI HBA Driver Dec 13 06:21:38.199433 systemd[1]: Finished dracut-cmdline.service. Dec 13 06:21:38.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.200949 systemd[1]: Starting dracut-pre-udev.service... Dec 13 06:21:38.204723 kernel: audit: type=1130 audit(1734070898.199:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.252823 kernel: raid6: avx512x4 gen() 28155 MB/s Dec 13 06:21:38.269794 kernel: raid6: avx512x4 xor() 6607 MB/s Dec 13 06:21:38.286787 kernel: raid6: avx512x2 gen() 28193 MB/s Dec 13 06:21:38.303843 kernel: raid6: avx512x2 xor() 21915 MB/s Dec 13 06:21:38.320833 kernel: raid6: avx512x1 gen() 27648 MB/s Dec 13 06:21:38.337845 kernel: raid6: avx512x1 xor() 20867 MB/s Dec 13 06:21:38.354805 kernel: raid6: avx2x4 gen() 19902 MB/s Dec 13 06:21:38.371851 kernel: raid6: avx2x4 xor() 5942 MB/s Dec 13 06:21:38.388815 kernel: raid6: avx2x2 gen() 20506 MB/s Dec 13 06:21:38.405808 kernel: raid6: avx2x2 xor() 16128 MB/s Dec 13 06:21:38.422844 kernel: raid6: avx2x1 gen() 18014 MB/s Dec 13 06:21:38.439800 kernel: raid6: avx2x1 xor() 13989 MB/s Dec 13 06:21:38.456822 kernel: raid6: sse2x4 gen() 8208 MB/s Dec 13 06:21:38.473786 kernel: raid6: sse2x4 xor() 4995 MB/s Dec 13 06:21:38.490799 kernel: raid6: sse2x2 gen() 8750 MB/s Dec 13 06:21:38.507803 kernel: raid6: sse2x2 xor() 5504 MB/s Dec 13 06:21:38.524850 kernel: raid6: sse2x1 gen() 7951 MB/s Dec 13 06:21:38.542416 kernel: raid6: sse2x1 xor() 4144 MB/s Dec 13 06:21:38.542562 kernel: raid6: using algorithm avx512x2 gen() 28193 MB/s Dec 13 06:21:38.542601 kernel: raid6: .... xor() 21915 MB/s, rmw enabled Dec 13 06:21:38.543107 kernel: raid6: using avx512x2 recovery algorithm Dec 13 06:21:38.557767 kernel: xor: automatically using best checksumming function avx Dec 13 06:21:38.661772 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 06:21:38.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.679803 systemd[1]: Finished dracut-pre-udev.service. Dec 13 06:21:38.680000 audit: BPF prog-id=7 op=LOAD Dec 13 06:21:38.680000 audit: BPF prog-id=8 op=LOAD Dec 13 06:21:38.681492 systemd[1]: Starting systemd-udevd.service... Dec 13 06:21:38.705862 systemd-udevd[402]: Using default interface naming scheme 'v252'. Dec 13 06:21:38.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.711612 systemd[1]: Started systemd-udevd.service. Dec 13 06:21:38.720019 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 06:21:38.738611 dracut-pre-trigger[417]: rd.md=0: removing MD RAID activation Dec 13 06:21:38.785326 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 06:21:38.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.787090 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 06:21:38.850540 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 06:21:38.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:38.915273 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 06:21:38.992867 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 06:21:38.992908 kernel: ACPI: bus type USB registered Dec 13 06:21:38.992931 kernel: usbcore: registered new interface driver usbfs Dec 13 06:21:38.992946 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 06:21:38.992959 kernel: usbcore: registered new interface driver hub Dec 13 06:21:38.992973 kernel: usbcore: registered new device driver usb Dec 13 06:21:38.992987 kernel: AES CTR mode by8 optimization enabled Dec 13 06:21:38.993002 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 06:21:38.993017 kernel: GPT:17805311 != 125829119 Dec 13 06:21:38.993030 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 06:21:38.993053 kernel: GPT:17805311 != 125829119 Dec 13 06:21:38.993066 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 06:21:38.993083 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 06:21:38.994729 kernel: libata version 3.00 loaded. Dec 13 06:21:39.012741 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 06:21:39.049848 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 06:21:39.049903 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (453) Dec 13 06:21:39.049940 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 06:21:39.050285 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 06:21:39.050567 kernel: scsi host0: ahci Dec 13 06:21:39.050901 kernel: scsi host1: ahci Dec 13 06:21:39.051182 kernel: scsi host2: ahci Dec 13 06:21:39.051466 kernel: scsi host3: ahci Dec 13 06:21:39.052897 kernel: scsi host4: ahci Dec 13 06:21:39.053222 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 06:21:39.053518 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 06:21:39.053863 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 06:21:39.054133 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 06:21:39.054395 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 06:21:39.054666 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 06:21:39.056032 kernel: hub 1-0:1.0: USB hub found Dec 13 06:21:39.056349 kernel: hub 1-0:1.0: 4 ports detected Dec 13 06:21:39.056640 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 06:21:39.057196 kernel: hub 2-0:1.0: USB hub found Dec 13 06:21:39.057547 kernel: hub 2-0:1.0: 4 ports detected Dec 13 06:21:39.057877 kernel: scsi host5: ahci Dec 13 06:21:39.058164 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Dec 13 06:21:39.058202 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Dec 13 06:21:39.058248 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Dec 13 06:21:39.058291 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Dec 13 06:21:39.058324 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Dec 13 06:21:39.058356 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Dec 13 06:21:39.024391 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 06:21:39.099557 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 06:21:39.115161 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 06:21:39.115761 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 06:21:39.124374 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 06:21:39.125917 systemd[1]: Starting disk-uuid.service... Dec 13 06:21:39.135777 disk-uuid[529]: Primary Header is updated. Dec 13 06:21:39.135777 disk-uuid[529]: Secondary Entries is updated. Dec 13 06:21:39.135777 disk-uuid[529]: Secondary Header is updated. Dec 13 06:21:39.141729 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 06:21:39.148719 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 06:21:39.282852 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 06:21:39.359796 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 06:21:39.359936 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 06:21:39.364566 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 06:21:39.368721 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 06:21:39.368768 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 06:21:39.373753 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 06:21:39.424747 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 06:21:39.429809 kernel: usbcore: registered new interface driver usbhid Dec 13 06:21:39.429898 kernel: usbhid: USB HID core driver Dec 13 06:21:39.435909 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Dec 13 06:21:39.435965 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 06:21:40.149093 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 06:21:40.150051 disk-uuid[530]: The operation has completed successfully. Dec 13 06:21:40.207382 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 06:21:40.209259 systemd[1]: Finished disk-uuid.service. Dec 13 06:21:40.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.211923 systemd[1]: Starting verity-setup.service... Dec 13 06:21:40.230769 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 06:21:40.281291 systemd[1]: Found device dev-mapper-usr.device. Dec 13 06:21:40.283034 systemd[1]: Mounting sysusr-usr.mount... Dec 13 06:21:40.284031 systemd[1]: Finished verity-setup.service. Dec 13 06:21:40.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.366761 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 06:21:40.367642 systemd[1]: Mounted sysusr-usr.mount. Dec 13 06:21:40.368263 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 06:21:40.369199 systemd[1]: Starting ignition-setup.service... Dec 13 06:21:40.378995 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 06:21:40.392541 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 06:21:40.392603 kernel: BTRFS info (device vda6): using free space tree Dec 13 06:21:40.392617 kernel: BTRFS info (device vda6): has skinny extents Dec 13 06:21:40.409126 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 06:21:40.415786 systemd[1]: Finished ignition-setup.service. Dec 13 06:21:40.417366 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 06:21:40.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.513024 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 06:21:40.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.523000 audit: BPF prog-id=9 op=LOAD Dec 13 06:21:40.526383 systemd[1]: Starting systemd-networkd.service... Dec 13 06:21:40.542085 ignition[630]: Ignition 2.14.0 Dec 13 06:21:40.542770 ignition[630]: Stage: fetch-offline Dec 13 06:21:40.543241 ignition[630]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:40.543275 ignition[630]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:40.544421 ignition[630]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:40.544536 ignition[630]: parsed url from cmdline: "" Dec 13 06:21:40.544540 ignition[630]: no config URL provided Dec 13 06:21:40.544546 ignition[630]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 06:21:40.544555 ignition[630]: no config at "/usr/lib/ignition/user.ign" Dec 13 06:21:40.544563 ignition[630]: failed to fetch config: resource requires networking Dec 13 06:21:40.547744 ignition[630]: Ignition finished successfully Dec 13 06:21:40.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.549039 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 06:21:40.554598 systemd-networkd[713]: lo: Link UP Dec 13 06:21:40.554613 systemd-networkd[713]: lo: Gained carrier Dec 13 06:21:40.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.555218 systemd-networkd[713]: Enumeration completed Dec 13 06:21:40.555460 systemd-networkd[713]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 06:21:40.555565 systemd[1]: Started systemd-networkd.service. Dec 13 06:21:40.577220 ignition[715]: Ignition 2.14.0 Dec 13 06:21:40.557114 systemd[1]: Reached target network.target. Dec 13 06:21:40.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.577228 ignition[715]: Stage: fetch Dec 13 06:21:40.558330 systemd[1]: Starting ignition-fetch.service... Dec 13 06:21:40.577386 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:40.589915 iscsid[723]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 06:21:40.589915 iscsid[723]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 06:21:40.589915 iscsid[723]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 06:21:40.589915 iscsid[723]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 06:21:40.589915 iscsid[723]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 06:21:40.589915 iscsid[723]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 06:21:40.589915 iscsid[723]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 06:21:40.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.561535 systemd[1]: Starting iscsiuio.service... Dec 13 06:21:40.577416 ignition[715]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:40.567546 systemd-networkd[713]: eth0: Link UP Dec 13 06:21:40.579147 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:40.567593 systemd-networkd[713]: eth0: Gained carrier Dec 13 06:21:40.579257 ignition[715]: parsed url from cmdline: "" Dec 13 06:21:40.581959 systemd[1]: Started iscsiuio.service. Dec 13 06:21:40.579261 ignition[715]: no config URL provided Dec 13 06:21:40.583857 systemd[1]: Starting iscsid.service... Dec 13 06:21:40.579266 ignition[715]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 06:21:40.590701 systemd[1]: Started iscsid.service. Dec 13 06:21:40.579276 ignition[715]: no config at "/usr/lib/ignition/user.ign" Dec 13 06:21:40.593952 systemd[1]: Starting dracut-initqueue.service... Dec 13 06:21:40.591297 ignition[715]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 06:21:40.596057 systemd-networkd[713]: eth0: DHCPv4 address 10.244.95.98/30, gateway 10.244.95.97 acquired from 10.244.95.97 Dec 13 06:21:40.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.594133 ignition[715]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 06:21:40.616989 systemd[1]: Finished dracut-initqueue.service. Dec 13 06:21:40.600259 ignition[715]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 06:21:40.617786 systemd[1]: Reached target remote-fs-pre.target. Dec 13 06:21:40.620032 ignition[715]: GET result: OK Dec 13 06:21:40.618186 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 06:21:40.620128 ignition[715]: parsing config with SHA512: e4cf25e51f488fbbcb4324d50765c8333cc217e4bd5cd61cb785c4cddc626e634cd021997c7ec9dd3e836d8345adc45c28b3bb1a1ee0579aa942980a56bcf72a Dec 13 06:21:40.618593 systemd[1]: Reached target remote-fs.target. Dec 13 06:21:40.621253 systemd[1]: Starting dracut-pre-mount.service... Dec 13 06:21:40.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.631343 systemd[1]: Finished dracut-pre-mount.service. Dec 13 06:21:40.634664 unknown[715]: fetched base config from "system" Dec 13 06:21:40.635105 unknown[715]: fetched base config from "system" Dec 13 06:21:40.635473 unknown[715]: fetched user config from "openstack" Dec 13 06:21:40.637129 ignition[715]: fetch: fetch complete Dec 13 06:21:40.637139 ignition[715]: fetch: fetch passed Dec 13 06:21:40.637189 ignition[715]: Ignition finished successfully Dec 13 06:21:40.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.639391 systemd[1]: Finished ignition-fetch.service. Dec 13 06:21:40.640693 systemd[1]: Starting ignition-kargs.service... Dec 13 06:21:40.650864 ignition[738]: Ignition 2.14.0 Dec 13 06:21:40.651433 ignition[738]: Stage: kargs Dec 13 06:21:40.651970 ignition[738]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:40.652511 ignition[738]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:40.653633 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:40.655407 ignition[738]: kargs: kargs passed Dec 13 06:21:40.655877 ignition[738]: Ignition finished successfully Dec 13 06:21:40.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.657072 systemd[1]: Finished ignition-kargs.service. Dec 13 06:21:40.658404 systemd[1]: Starting ignition-disks.service... Dec 13 06:21:40.667370 ignition[743]: Ignition 2.14.0 Dec 13 06:21:40.667980 ignition[743]: Stage: disks Dec 13 06:21:40.668468 ignition[743]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:40.669023 ignition[743]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:40.670139 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:40.671811 ignition[743]: disks: disks passed Dec 13 06:21:40.672282 ignition[743]: Ignition finished successfully Dec 13 06:21:40.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.673446 systemd[1]: Finished ignition-disks.service. Dec 13 06:21:40.673972 systemd[1]: Reached target initrd-root-device.target. Dec 13 06:21:40.674330 systemd[1]: Reached target local-fs-pre.target. Dec 13 06:21:40.674667 systemd[1]: Reached target local-fs.target. Dec 13 06:21:40.675039 systemd[1]: Reached target sysinit.target. Dec 13 06:21:40.675749 systemd[1]: Reached target basic.target. Dec 13 06:21:40.677409 systemd[1]: Starting systemd-fsck-root.service... Dec 13 06:21:40.693371 systemd-fsck[750]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 06:21:40.696453 systemd[1]: Finished systemd-fsck-root.service. Dec 13 06:21:40.697769 systemd[1]: Mounting sysroot.mount... Dec 13 06:21:40.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.709723 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 06:21:40.709376 systemd[1]: Mounted sysroot.mount. Dec 13 06:21:40.710268 systemd[1]: Reached target initrd-root-fs.target. Dec 13 06:21:40.712165 systemd[1]: Mounting sysroot-usr.mount... Dec 13 06:21:40.713438 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 06:21:40.714763 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 06:21:40.715642 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 06:21:40.716280 systemd[1]: Reached target ignition-diskful.target. Dec 13 06:21:40.718096 systemd[1]: Mounted sysroot-usr.mount. Dec 13 06:21:40.719578 systemd[1]: Starting initrd-setup-root.service... Dec 13 06:21:40.725506 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 06:21:40.735412 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Dec 13 06:21:40.742333 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 06:21:40.748105 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 06:21:40.824691 systemd[1]: Finished initrd-setup-root.service. Dec 13 06:21:40.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.827083 systemd[1]: Starting ignition-mount.service... Dec 13 06:21:40.837268 systemd[1]: Starting sysroot-boot.service... Dec 13 06:21:40.847972 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 06:21:40.865141 coreos-metadata[756]: Dec 13 06:21:40.865 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 06:21:40.868519 ignition[806]: INFO : Ignition 2.14.0 Dec 13 06:21:40.869156 ignition[806]: INFO : Stage: mount Dec 13 06:21:40.869687 ignition[806]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:40.870252 ignition[806]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:40.872053 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:40.873912 ignition[806]: INFO : mount: mount passed Dec 13 06:21:40.874354 ignition[806]: INFO : Ignition finished successfully Dec 13 06:21:40.875847 systemd[1]: Finished ignition-mount.service. Dec 13 06:21:40.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.879271 systemd[1]: Finished sysroot-boot.service. Dec 13 06:21:40.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.881047 coreos-metadata[756]: Dec 13 06:21:40.880 INFO Fetch successful Dec 13 06:21:40.881563 coreos-metadata[756]: Dec 13 06:21:40.881 INFO wrote hostname srv-3em3z.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 06:21:40.883905 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 06:21:40.883997 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 06:21:40.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:40.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:41.303067 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 06:21:41.318055 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (813) Dec 13 06:21:41.318163 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 06:21:41.318231 kernel: BTRFS info (device vda6): using free space tree Dec 13 06:21:41.319183 kernel: BTRFS info (device vda6): has skinny extents Dec 13 06:21:41.328755 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 06:21:41.333136 systemd[1]: Starting ignition-files.service... Dec 13 06:21:41.352797 ignition[833]: INFO : Ignition 2.14.0 Dec 13 06:21:41.353387 ignition[833]: INFO : Stage: files Dec 13 06:21:41.353903 ignition[833]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:41.354450 ignition[833]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:41.356233 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:41.358721 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Dec 13 06:21:41.360080 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 06:21:41.360751 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 06:21:41.363835 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 06:21:41.364649 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 06:21:41.365872 unknown[833]: wrote ssh authorized keys file for user: core Dec 13 06:21:41.366490 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 06:21:41.367695 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 06:21:41.368398 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 06:21:41.544916 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 06:21:41.736827 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 06:21:41.736827 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 06:21:41.739924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 06:21:41.789969 systemd-networkd[713]: eth0: Gained IPv6LL Dec 13 06:21:42.390985 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 06:21:43.300701 systemd-networkd[713]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:17d8:24:19ff:fef4:5f62/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:17d8:24:19ff:fef4:5f62/64 assigned by NDisc. Dec 13 06:21:43.300731 systemd-networkd[713]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 06:21:43.894259 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 06:21:43.894259 ignition[833]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 06:21:43.894259 ignition[833]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 06:21:43.894259 ignition[833]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 06:21:43.900602 ignition[833]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 06:21:43.915278 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 06:21:43.915308 kernel: audit: type=1130 audit(1734070903.905:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.915400 ignition[833]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 06:21:43.915400 ignition[833]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 06:21:43.915400 ignition[833]: INFO : files: files passed Dec 13 06:21:43.915400 ignition[833]: INFO : Ignition finished successfully Dec 13 06:21:43.929074 kernel: audit: type=1130 audit(1734070903.919:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.929108 kernel: audit: type=1130 audit(1734070903.923:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.929124 kernel: audit: type=1131 audit(1734070903.923:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.904888 systemd[1]: Finished ignition-files.service. Dec 13 06:21:43.907492 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 06:21:43.930391 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 06:21:43.914768 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 06:21:43.916178 systemd[1]: Starting ignition-quench.service... Dec 13 06:21:43.919569 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 06:21:43.920492 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 06:21:43.920568 systemd[1]: Finished ignition-quench.service. Dec 13 06:21:43.923839 systemd[1]: Reached target ignition-complete.target. Dec 13 06:21:43.930245 systemd[1]: Starting initrd-parse-etc.service... Dec 13 06:21:43.955587 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 06:21:43.956435 systemd[1]: Finished initrd-parse-etc.service. Dec 13 06:21:43.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.968221 systemd[1]: Reached target initrd-fs.target. Dec 13 06:21:43.982982 kernel: audit: type=1130 audit(1734070903.967:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.983047 kernel: audit: type=1131 audit(1734070903.967:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:43.969141 systemd[1]: Reached target initrd.target. Dec 13 06:21:43.981905 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 06:21:43.983066 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 06:21:44.002945 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 06:21:44.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.005172 systemd[1]: Starting initrd-cleanup.service... Dec 13 06:21:44.012601 kernel: audit: type=1130 audit(1734070904.003:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.024873 systemd[1]: Stopped target nss-lookup.target. Dec 13 06:21:44.025723 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 06:21:44.027341 systemd[1]: Stopped target timers.target. Dec 13 06:21:44.028873 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 06:21:44.033823 kernel: audit: type=1131 audit(1734070904.029:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.029064 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 06:21:44.030076 systemd[1]: Stopped target initrd.target. Dec 13 06:21:44.034249 systemd[1]: Stopped target basic.target. Dec 13 06:21:44.034989 systemd[1]: Stopped target ignition-complete.target. Dec 13 06:21:44.035771 systemd[1]: Stopped target ignition-diskful.target. Dec 13 06:21:44.036512 systemd[1]: Stopped target initrd-root-device.target. Dec 13 06:21:44.037420 systemd[1]: Stopped target remote-fs.target. Dec 13 06:21:44.038108 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 06:21:44.038891 systemd[1]: Stopped target sysinit.target. Dec 13 06:21:44.039633 systemd[1]: Stopped target local-fs.target. Dec 13 06:21:44.040277 systemd[1]: Stopped target local-fs-pre.target. Dec 13 06:21:44.040913 systemd[1]: Stopped target swap.target. Dec 13 06:21:44.044992 kernel: audit: type=1131 audit(1734070904.041:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.041495 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 06:21:44.041644 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 06:21:44.048907 kernel: audit: type=1131 audit(1734070904.045:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.042300 systemd[1]: Stopped target cryptsetup.target. Dec 13 06:21:44.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.045395 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 06:21:44.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.045532 systemd[1]: Stopped dracut-initqueue.service. Dec 13 06:21:44.046193 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 06:21:44.046325 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 06:21:44.049454 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 06:21:44.049578 systemd[1]: Stopped ignition-files.service. Dec 13 06:21:44.052701 iscsid[723]: iscsid shutting down. Dec 13 06:21:44.051187 systemd[1]: Stopping ignition-mount.service... Dec 13 06:21:44.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.054785 systemd[1]: Stopping iscsid.service... Dec 13 06:21:44.055135 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 06:21:44.064373 ignition[871]: INFO : Ignition 2.14.0 Dec 13 06:21:44.064373 ignition[871]: INFO : Stage: umount Dec 13 06:21:44.064373 ignition[871]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 06:21:44.064373 ignition[871]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 06:21:44.055290 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 06:21:44.056812 systemd[1]: Stopping sysroot-boot.service... Dec 13 06:21:44.057262 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 06:21:44.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.070379 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 06:21:44.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.057458 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 06:21:44.079963 ignition[871]: INFO : umount: umount passed Dec 13 06:21:44.079963 ignition[871]: INFO : Ignition finished successfully Dec 13 06:21:44.058082 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 06:21:44.058222 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 06:21:44.060827 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 06:21:44.060947 systemd[1]: Stopped iscsid.service. Dec 13 06:21:44.070159 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 06:21:44.070261 systemd[1]: Finished initrd-cleanup.service. Dec 13 06:21:44.072411 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 06:21:44.076249 systemd[1]: Stopped ignition-mount.service. Dec 13 06:21:44.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.085433 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 06:21:44.087132 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 06:21:44.087634 systemd[1]: Stopped ignition-disks.service. Dec 13 06:21:44.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.088485 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 06:21:44.089044 systemd[1]: Stopped ignition-kargs.service. Dec 13 06:21:44.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.089880 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 06:21:44.090338 systemd[1]: Stopped ignition-fetch.service. Dec 13 06:21:44.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.091840 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 06:21:44.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.091927 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 06:21:44.092554 systemd[1]: Stopped target paths.target. Dec 13 06:21:44.093506 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 06:21:44.096748 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 06:21:44.097315 systemd[1]: Stopped target slices.target. Dec 13 06:21:44.098734 systemd[1]: Stopped target sockets.target. Dec 13 06:21:44.100008 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 06:21:44.100105 systemd[1]: Closed iscsid.socket. Dec 13 06:21:44.101955 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 06:21:44.102084 systemd[1]: Stopped ignition-setup.service. Dec 13 06:21:44.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.105754 systemd[1]: Stopping iscsiuio.service... Dec 13 06:21:44.111389 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 06:21:44.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.111624 systemd[1]: Stopped iscsiuio.service. Dec 13 06:21:44.112893 systemd[1]: Stopped target network.target. Dec 13 06:21:44.114053 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 06:21:44.114138 systemd[1]: Closed iscsiuio.socket. Dec 13 06:21:44.116979 systemd[1]: Stopping systemd-networkd.service... Dec 13 06:21:44.120934 systemd-networkd[713]: eth0: DHCPv6 lease lost Dec 13 06:21:44.122946 systemd[1]: Stopping systemd-resolved.service... Dec 13 06:21:44.123865 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 06:21:44.123983 systemd[1]: Stopped systemd-networkd.service. Dec 13 06:21:44.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.125411 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 06:21:44.125520 systemd[1]: Stopped sysroot-boot.service. Dec 13 06:21:44.130409 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 06:21:44.131119 systemd[1]: Stopped systemd-resolved.service. Dec 13 06:21:44.132496 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 06:21:44.132994 systemd[1]: Closed systemd-networkd.socket. Dec 13 06:21:44.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.131000 audit: BPF prog-id=9 op=UNLOAD Dec 13 06:21:44.133844 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 06:21:44.134310 systemd[1]: Stopped initrd-setup-root.service. Dec 13 06:21:44.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.135000 audit: BPF prog-id=6 op=UNLOAD Dec 13 06:21:44.136250 systemd[1]: Stopping network-cleanup.service... Dec 13 06:21:44.137191 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 06:21:44.140898 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 06:21:44.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.155650 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 06:21:44.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.155811 systemd[1]: Stopped systemd-sysctl.service. Dec 13 06:21:44.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.156935 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 06:21:44.157010 systemd[1]: Stopped systemd-modules-load.service. Dec 13 06:21:44.158099 systemd[1]: Stopping systemd-udevd.service... Dec 13 06:21:44.166364 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 06:21:44.170531 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 06:21:44.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.170686 systemd[1]: Stopped systemd-udevd.service. Dec 13 06:21:44.173569 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 06:21:44.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.174046 systemd[1]: Stopped network-cleanup.service. Dec 13 06:21:44.175852 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 06:21:44.175962 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 06:21:44.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.177497 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 06:21:44.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.177572 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 06:21:44.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.179353 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 06:21:44.179453 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 06:21:44.181520 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 06:21:44.181619 systemd[1]: Stopped dracut-cmdline.service. Dec 13 06:21:44.182983 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 06:21:44.183028 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 06:21:44.185226 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 06:21:44.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.192288 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 06:21:44.192375 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 06:21:44.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.194026 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 06:21:44.194128 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 06:21:44.194790 systemd[1]: Reached target initrd-switch-root.target. Dec 13 06:21:44.195970 systemd[1]: Starting initrd-switch-root.service... Dec 13 06:21:44.209209 systemd[1]: Switching root. Dec 13 06:21:44.219771 systemd-journald[201]: Journal stopped Dec 13 06:21:47.378382 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Dec 13 06:21:47.378492 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 06:21:47.378512 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 06:21:47.378535 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 06:21:47.378556 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 06:21:47.378582 kernel: SELinux: policy capability open_perms=1 Dec 13 06:21:47.378596 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 06:21:47.378608 kernel: SELinux: policy capability always_check_network=0 Dec 13 06:21:47.378628 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 06:21:47.378640 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 06:21:47.378652 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 06:21:47.378665 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 06:21:47.378685 systemd[1]: Successfully loaded SELinux policy in 49.903ms. Dec 13 06:21:47.381827 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.651ms. Dec 13 06:21:47.381881 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 06:21:47.381896 systemd[1]: Detected virtualization kvm. Dec 13 06:21:47.381910 systemd[1]: Detected architecture x86-64. Dec 13 06:21:47.381928 systemd[1]: Detected first boot. Dec 13 06:21:47.381942 systemd[1]: Hostname set to . Dec 13 06:21:47.381956 systemd[1]: Initializing machine ID from VM UUID. Dec 13 06:21:47.381970 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 06:21:47.382001 systemd[1]: Populated /etc with preset unit settings. Dec 13 06:21:47.382016 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 06:21:47.382035 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 06:21:47.382049 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 06:21:47.382072 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 06:21:47.382085 systemd[1]: Stopped initrd-switch-root.service. Dec 13 06:21:47.382097 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 06:21:47.382109 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 06:21:47.382131 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 06:21:47.382144 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 06:21:47.382160 systemd[1]: Created slice system-getty.slice. Dec 13 06:21:47.382177 systemd[1]: Created slice system-modprobe.slice. Dec 13 06:21:47.382193 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 06:21:47.382205 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 06:21:47.382217 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 06:21:47.382229 systemd[1]: Created slice user.slice. Dec 13 06:21:47.382241 systemd[1]: Started systemd-ask-password-console.path. Dec 13 06:21:47.382253 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 06:21:47.382267 systemd[1]: Set up automount boot.automount. Dec 13 06:21:47.382284 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 06:21:47.382299 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 06:21:47.382327 systemd[1]: Stopped target initrd-fs.target. Dec 13 06:21:47.382341 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 06:21:47.382354 systemd[1]: Reached target integritysetup.target. Dec 13 06:21:47.382372 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 06:21:47.382385 systemd[1]: Reached target remote-fs.target. Dec 13 06:21:47.382403 systemd[1]: Reached target slices.target. Dec 13 06:21:47.382416 systemd[1]: Reached target swap.target. Dec 13 06:21:47.382429 systemd[1]: Reached target torcx.target. Dec 13 06:21:47.382446 systemd[1]: Reached target veritysetup.target. Dec 13 06:21:47.382463 systemd[1]: Listening on systemd-coredump.socket. Dec 13 06:21:47.382476 systemd[1]: Listening on systemd-initctl.socket. Dec 13 06:21:47.382489 systemd[1]: Listening on systemd-networkd.socket. Dec 13 06:21:47.382503 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 06:21:47.382518 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 06:21:47.382532 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 06:21:47.382553 systemd[1]: Mounting dev-hugepages.mount... Dec 13 06:21:47.382567 systemd[1]: Mounting dev-mqueue.mount... Dec 13 06:21:47.382581 systemd[1]: Mounting media.mount... Dec 13 06:21:47.382596 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 06:21:47.382609 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 06:21:47.382623 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 06:21:47.382636 systemd[1]: Mounting tmp.mount... Dec 13 06:21:47.382650 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 06:21:47.382663 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 06:21:47.382681 systemd[1]: Starting kmod-static-nodes.service... Dec 13 06:21:47.382694 systemd[1]: Starting modprobe@configfs.service... Dec 13 06:21:47.382732 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 06:21:47.382745 systemd[1]: Starting modprobe@drm.service... Dec 13 06:21:47.382758 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 06:21:47.382772 systemd[1]: Starting modprobe@fuse.service... Dec 13 06:21:47.382786 systemd[1]: Starting modprobe@loop.service... Dec 13 06:21:47.382800 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 06:21:47.382819 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 06:21:47.382832 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 06:21:47.382846 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 06:21:47.382864 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 06:21:47.382877 systemd[1]: Stopped systemd-journald.service. Dec 13 06:21:47.382891 systemd[1]: Starting systemd-journald.service... Dec 13 06:21:47.382905 systemd[1]: Starting systemd-modules-load.service... Dec 13 06:21:47.382918 systemd[1]: Starting systemd-network-generator.service... Dec 13 06:21:47.382931 systemd[1]: Starting systemd-remount-fs.service... Dec 13 06:21:47.382947 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 06:21:47.382966 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 06:21:47.382983 systemd[1]: Stopped verity-setup.service. Dec 13 06:21:47.382998 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 06:21:47.383011 systemd[1]: Mounted dev-hugepages.mount. Dec 13 06:21:47.383024 systemd[1]: Mounted dev-mqueue.mount. Dec 13 06:21:47.383037 systemd[1]: Mounted media.mount. Dec 13 06:21:47.383050 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 06:21:47.383064 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 06:21:47.383081 systemd[1]: Mounted tmp.mount. Dec 13 06:21:47.383104 systemd-journald[982]: Journal started Dec 13 06:21:47.383168 systemd-journald[982]: Runtime Journal (/run/log/journal/c5c302a38521448e8e2bb79c85205f1f) is 4.7M, max 38.1M, 33.3M free. Dec 13 06:21:44.357000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 06:21:44.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 06:21:44.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 06:21:44.421000 audit: BPF prog-id=10 op=LOAD Dec 13 06:21:44.421000 audit: BPF prog-id=10 op=UNLOAD Dec 13 06:21:44.421000 audit: BPF prog-id=11 op=LOAD Dec 13 06:21:44.421000 audit: BPF prog-id=11 op=UNLOAD Dec 13 06:21:44.516000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 06:21:44.516000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:21:44.516000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 06:21:44.518000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 06:21:44.518000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:21:44.518000 audit: CWD cwd="/" Dec 13 06:21:44.518000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:44.518000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:44.518000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 06:21:47.221000 audit: BPF prog-id=12 op=LOAD Dec 13 06:21:47.222000 audit: BPF prog-id=3 op=UNLOAD Dec 13 06:21:47.222000 audit: BPF prog-id=13 op=LOAD Dec 13 06:21:47.222000 audit: BPF prog-id=14 op=LOAD Dec 13 06:21:47.222000 audit: BPF prog-id=4 op=UNLOAD Dec 13 06:21:47.222000 audit: BPF prog-id=5 op=UNLOAD Dec 13 06:21:47.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.233000 audit: BPF prog-id=12 op=UNLOAD Dec 13 06:21:47.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.384222 systemd[1]: Finished kmod-static-nodes.service. Dec 13 06:21:47.342000 audit: BPF prog-id=15 op=LOAD Dec 13 06:21:47.342000 audit: BPF prog-id=16 op=LOAD Dec 13 06:21:47.342000 audit: BPF prog-id=17 op=LOAD Dec 13 06:21:47.342000 audit: BPF prog-id=13 op=UNLOAD Dec 13 06:21:47.342000 audit: BPF prog-id=14 op=UNLOAD Dec 13 06:21:47.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.376000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 06:21:47.376000 audit[982]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd783bc1d0 a2=4000 a3=7ffd783bc26c items=0 ppid=1 pid=982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:21:47.376000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 06:21:47.219676 systemd[1]: Queued start job for default target multi-user.target. Dec 13 06:21:47.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:44.511503 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 06:21:47.219694 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 06:21:44.514144 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 06:21:47.223938 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 06:21:44.514167 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 06:21:44.514208 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 06:21:44.514221 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 06:21:44.514259 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 06:21:44.514274 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 06:21:44.514505 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 06:21:44.514552 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 06:21:47.386562 systemd[1]: Started systemd-journald.service. Dec 13 06:21:44.514569 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 06:21:44.516184 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 06:21:44.516226 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 06:21:44.516248 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 06:21:44.516265 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 06:21:44.516286 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 06:21:44.516301 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 06:21:47.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:46.790982 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:46Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 06:21:46.792114 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:46Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 06:21:46.792256 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:46Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 06:21:46.792475 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:46Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 06:21:46.794036 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:46Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 06:21:46.794160 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-12-13T06:21:46Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 06:21:47.388831 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 06:21:47.388990 systemd[1]: Finished modprobe@configfs.service. Dec 13 06:21:47.390221 kernel: loop: module loaded Dec 13 06:21:47.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.390079 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 06:21:47.390220 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 06:21:47.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.392083 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 06:21:47.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.392254 systemd[1]: Finished modprobe@drm.service. Dec 13 06:21:47.392995 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 06:21:47.393152 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 06:21:47.393892 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 06:21:47.394048 systemd[1]: Finished modprobe@loop.service. Dec 13 06:21:47.394732 systemd[1]: Finished systemd-modules-load.service. Dec 13 06:21:47.395374 systemd[1]: Finished systemd-network-generator.service. Dec 13 06:21:47.396219 kernel: fuse: init (API version 7.34) Dec 13 06:21:47.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.397041 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 06:21:47.397187 systemd[1]: Finished modprobe@fuse.service. Dec 13 06:21:47.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.398651 systemd[1]: Finished systemd-remount-fs.service. Dec 13 06:21:47.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.401061 systemd[1]: Reached target network-pre.target. Dec 13 06:21:47.403025 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 06:21:47.408840 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 06:21:47.409281 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 06:21:47.411214 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 06:21:47.412794 systemd[1]: Starting systemd-journal-flush.service... Dec 13 06:21:47.413267 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 06:21:47.415303 systemd[1]: Starting systemd-random-seed.service... Dec 13 06:21:47.415826 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 06:21:47.417065 systemd[1]: Starting systemd-sysctl.service... Dec 13 06:21:47.420954 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 06:21:47.421661 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 06:21:47.427241 systemd-journald[982]: Time spent on flushing to /var/log/journal/c5c302a38521448e8e2bb79c85205f1f is 56.034ms for 1303 entries. Dec 13 06:21:47.427241 systemd-journald[982]: System Journal (/var/log/journal/c5c302a38521448e8e2bb79c85205f1f) is 8.0M, max 584.8M, 576.8M free. Dec 13 06:21:47.492103 systemd-journald[982]: Received client request to flush runtime journal. Dec 13 06:21:47.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.440128 systemd[1]: Finished systemd-random-seed.service. Dec 13 06:21:47.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.440662 systemd[1]: Reached target first-boot-complete.target. Dec 13 06:21:47.443873 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 06:21:47.445589 systemd[1]: Starting systemd-sysusers.service... Dec 13 06:21:47.464302 systemd[1]: Finished systemd-sysctl.service. Dec 13 06:21:47.475373 systemd[1]: Finished systemd-sysusers.service. Dec 13 06:21:47.493172 systemd[1]: Finished systemd-journal-flush.service. Dec 13 06:21:47.526447 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 06:21:47.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.528314 systemd[1]: Starting systemd-udev-settle.service... Dec 13 06:21:47.538008 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 06:21:47.997595 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 06:21:47.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:47.999000 audit: BPF prog-id=18 op=LOAD Dec 13 06:21:47.999000 audit: BPF prog-id=19 op=LOAD Dec 13 06:21:47.999000 audit: BPF prog-id=7 op=UNLOAD Dec 13 06:21:47.999000 audit: BPF prog-id=8 op=UNLOAD Dec 13 06:21:48.002020 systemd[1]: Starting systemd-udevd.service... Dec 13 06:21:48.022826 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Dec 13 06:21:48.045771 systemd[1]: Started systemd-udevd.service. Dec 13 06:21:48.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.051000 audit: BPF prog-id=20 op=LOAD Dec 13 06:21:48.055819 systemd[1]: Starting systemd-networkd.service... Dec 13 06:21:48.061000 audit: BPF prog-id=21 op=LOAD Dec 13 06:21:48.061000 audit: BPF prog-id=22 op=LOAD Dec 13 06:21:48.061000 audit: BPF prog-id=23 op=LOAD Dec 13 06:21:48.062835 systemd[1]: Starting systemd-userdbd.service... Dec 13 06:21:48.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.104447 systemd[1]: Started systemd-userdbd.service. Dec 13 06:21:48.138446 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 06:21:48.187862 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 06:21:48.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.186326 systemd-networkd[1029]: lo: Link UP Dec 13 06:21:48.186337 systemd-networkd[1029]: lo: Gained carrier Dec 13 06:21:48.186925 systemd-networkd[1029]: Enumeration completed Dec 13 06:21:48.187055 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 06:21:48.187257 systemd[1]: Started systemd-networkd.service. Dec 13 06:21:48.189213 systemd-networkd[1029]: eth0: Link UP Dec 13 06:21:48.189224 systemd-networkd[1029]: eth0: Gained carrier Dec 13 06:21:48.194725 kernel: ACPI: button: Power Button [PWRF] Dec 13 06:21:48.200916 systemd-networkd[1029]: eth0: DHCPv4 address 10.244.95.98/30, gateway 10.244.95.97 acquired from 10.244.95.97 Dec 13 06:21:48.227000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 06:21:48.227000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55adcc141860 a1=337fc a2=7f8436f21bc5 a3=5 items=110 ppid=1014 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:21:48.227000 audit: CWD cwd="/" Dec 13 06:21:48.227000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=1 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=2 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=3 name=(null) inode=16002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=4 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=5 name=(null) inode=16003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=6 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=7 name=(null) inode=16004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=8 name=(null) inode=16004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=9 name=(null) inode=16005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=10 name=(null) inode=16004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=11 name=(null) inode=16006 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=12 name=(null) inode=16004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=13 name=(null) inode=16007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=14 name=(null) inode=16004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=15 name=(null) inode=16008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=16 name=(null) inode=16004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=17 name=(null) inode=16009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=18 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=19 name=(null) inode=16010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=20 name=(null) inode=16010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=21 name=(null) inode=16011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=22 name=(null) inode=16010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=23 name=(null) inode=16012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=24 name=(null) inode=16010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=25 name=(null) inode=16013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=26 name=(null) inode=16010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=27 name=(null) inode=16014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=28 name=(null) inode=16010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=29 name=(null) inode=16015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=30 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=31 name=(null) inode=16016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=32 name=(null) inode=16016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=33 name=(null) inode=16017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=34 name=(null) inode=16016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=35 name=(null) inode=16018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=36 name=(null) inode=16016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=37 name=(null) inode=16019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=38 name=(null) inode=16016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=39 name=(null) inode=16020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=40 name=(null) inode=16016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=41 name=(null) inode=16021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=42 name=(null) inode=16001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=43 name=(null) inode=16022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=44 name=(null) inode=16022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=45 name=(null) inode=16023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=46 name=(null) inode=16022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=47 name=(null) inode=16024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=48 name=(null) inode=16022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=49 name=(null) inode=16025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=50 name=(null) inode=16022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=51 name=(null) inode=16026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=52 name=(null) inode=16022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=53 name=(null) inode=16027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=55 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=56 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=57 name=(null) inode=16029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=58 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=59 name=(null) inode=16030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=60 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=61 name=(null) inode=16031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=62 name=(null) inode=16031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=63 name=(null) inode=16032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=64 name=(null) inode=16031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=65 name=(null) inode=16033 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=66 name=(null) inode=16031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=67 name=(null) inode=16034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=68 name=(null) inode=16031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=69 name=(null) inode=16035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=70 name=(null) inode=16031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=71 name=(null) inode=16036 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=72 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=73 name=(null) inode=16037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=74 name=(null) inode=16037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=75 name=(null) inode=16038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=76 name=(null) inode=16037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=77 name=(null) inode=16039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=78 name=(null) inode=16037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=79 name=(null) inode=16040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=80 name=(null) inode=16037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=81 name=(null) inode=16041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=82 name=(null) inode=16037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=83 name=(null) inode=16042 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=84 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=85 name=(null) inode=16043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=86 name=(null) inode=16043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=87 name=(null) inode=16044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=88 name=(null) inode=16043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=89 name=(null) inode=16045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=90 name=(null) inode=16043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=91 name=(null) inode=16046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=92 name=(null) inode=16043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=93 name=(null) inode=16047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=94 name=(null) inode=16043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=95 name=(null) inode=16048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=96 name=(null) inode=16028 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=97 name=(null) inode=16049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=98 name=(null) inode=16049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=99 name=(null) inode=16050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=100 name=(null) inode=16049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=101 name=(null) inode=16051 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=102 name=(null) inode=16049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=103 name=(null) inode=16052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=104 name=(null) inode=16049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=105 name=(null) inode=16053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=106 name=(null) inode=16049 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=107 name=(null) inode=16054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PATH item=109 name=(null) inode=16055 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:21:48.227000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 06:21:48.266794 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 06:21:48.272728 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 06:21:48.291987 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 06:21:48.292013 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 06:21:48.292158 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 06:21:48.285738 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 06:21:48.461387 systemd[1]: Finished systemd-udev-settle.service. Dec 13 06:21:48.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.463657 systemd[1]: Starting lvm2-activation-early.service... Dec 13 06:21:48.492466 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 06:21:48.526158 systemd[1]: Finished lvm2-activation-early.service. Dec 13 06:21:48.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.527553 systemd[1]: Reached target cryptsetup.target. Dec 13 06:21:48.531299 systemd[1]: Starting lvm2-activation.service... Dec 13 06:21:48.540919 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 06:21:48.567183 systemd[1]: Finished lvm2-activation.service. Dec 13 06:21:48.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.568503 systemd[1]: Reached target local-fs-pre.target. Dec 13 06:21:48.569537 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 06:21:48.569608 systemd[1]: Reached target local-fs.target. Dec 13 06:21:48.570575 systemd[1]: Reached target machines.target. Dec 13 06:21:48.574651 systemd[1]: Starting ldconfig.service... Dec 13 06:21:48.576884 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 06:21:48.577074 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:48.580209 systemd[1]: Starting systemd-boot-update.service... Dec 13 06:21:48.591061 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 06:21:48.593113 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 06:21:48.596049 systemd[1]: Starting systemd-sysext.service... Dec 13 06:21:48.597079 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Dec 13 06:21:48.598623 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 06:21:48.608955 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 06:21:48.613025 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 06:21:48.613195 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 06:21:48.629801 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 06:21:48.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.644812 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 06:21:48.671191 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 06:21:48.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.674027 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 06:21:48.693767 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 06:21:48.713870 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 06:21:48.725344 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Dec 13 06:21:48.725344 systemd-fsck[1056]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 06:21:48.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.732356 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 06:21:48.735255 (sd-sysext)[1059]: Using extensions 'kubernetes'. Dec 13 06:21:48.736359 (sd-sysext)[1059]: Merged extensions into '/usr'. Dec 13 06:21:48.741762 systemd[1]: Mounting boot.mount... Dec 13 06:21:48.759662 systemd[1]: Mounted boot.mount. Dec 13 06:21:48.766263 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 06:21:48.768543 systemd[1]: Mounting usr-share-oem.mount... Dec 13 06:21:48.772071 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 06:21:48.773624 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 06:21:48.775669 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 06:21:48.779147 systemd[1]: Starting modprobe@loop.service... Dec 13 06:21:48.779652 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 06:21:48.779842 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:48.779976 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 06:21:48.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.783190 systemd[1]: Finished systemd-boot-update.service. Dec 13 06:21:48.784058 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 06:21:48.784186 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 06:21:48.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.785332 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 06:21:48.785453 systemd[1]: Finished modprobe@loop.service. Dec 13 06:21:48.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.789125 systemd[1]: Mounted usr-share-oem.mount. Dec 13 06:21:48.789867 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 06:21:48.789997 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 06:21:48.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.790931 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 06:21:48.791038 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 06:21:48.792410 systemd[1]: Finished systemd-sysext.service. Dec 13 06:21:48.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:48.795313 systemd[1]: Starting ensure-sysext.service... Dec 13 06:21:48.802487 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 06:21:48.805340 systemd[1]: Reloading. Dec 13 06:21:48.831069 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 06:21:48.838112 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 06:21:48.845644 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 06:21:48.941007 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2024-12-13T06:21:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 06:21:48.941042 /usr/lib/systemd/system-generators/torcx-generator[1089]: time="2024-12-13T06:21:48Z" level=info msg="torcx already run" Dec 13 06:21:48.994285 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 06:21:49.073546 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 06:21:49.073582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 06:21:49.093867 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 06:21:49.160083 kernel: kauditd_printk_skb: 234 callbacks suppressed Dec 13 06:21:49.160348 kernel: audit: type=1334 audit(1734070909.154:160): prog-id=24 op=LOAD Dec 13 06:21:49.154000 audit: BPF prog-id=24 op=LOAD Dec 13 06:21:49.166389 kernel: audit: type=1334 audit(1734070909.154:161): prog-id=25 op=LOAD Dec 13 06:21:49.154000 audit: BPF prog-id=25 op=LOAD Dec 13 06:21:49.154000 audit: BPF prog-id=18 op=UNLOAD Dec 13 06:21:49.170016 kernel: audit: type=1334 audit(1734070909.154:162): prog-id=18 op=UNLOAD Dec 13 06:21:49.170067 kernel: audit: type=1334 audit(1734070909.154:163): prog-id=19 op=UNLOAD Dec 13 06:21:49.154000 audit: BPF prog-id=19 op=UNLOAD Dec 13 06:21:49.171612 kernel: audit: type=1334 audit(1734070909.156:164): prog-id=26 op=LOAD Dec 13 06:21:49.156000 audit: BPF prog-id=26 op=LOAD Dec 13 06:21:49.156000 audit: BPF prog-id=20 op=UNLOAD Dec 13 06:21:49.174602 kernel: audit: type=1334 audit(1734070909.156:165): prog-id=20 op=UNLOAD Dec 13 06:21:49.174643 kernel: audit: type=1334 audit(1734070909.159:166): prog-id=27 op=LOAD Dec 13 06:21:49.159000 audit: BPF prog-id=27 op=LOAD Dec 13 06:21:49.159000 audit: BPF prog-id=15 op=UNLOAD Dec 13 06:21:49.176651 kernel: audit: type=1334 audit(1734070909.159:167): prog-id=15 op=UNLOAD Dec 13 06:21:49.176690 kernel: audit: type=1334 audit(1734070909.159:168): prog-id=28 op=LOAD Dec 13 06:21:49.159000 audit: BPF prog-id=28 op=LOAD Dec 13 06:21:49.159000 audit: BPF prog-id=29 op=LOAD Dec 13 06:21:49.159000 audit: BPF prog-id=16 op=UNLOAD Dec 13 06:21:49.159000 audit: BPF prog-id=17 op=UNLOAD Dec 13 06:21:49.165000 audit: BPF prog-id=30 op=LOAD Dec 13 06:21:49.166000 audit: BPF prog-id=21 op=UNLOAD Dec 13 06:21:49.167000 audit: BPF prog-id=31 op=LOAD Dec 13 06:21:49.167000 audit: BPF prog-id=32 op=LOAD Dec 13 06:21:49.167000 audit: BPF prog-id=22 op=UNLOAD Dec 13 06:21:49.167000 audit: BPF prog-id=23 op=UNLOAD Dec 13 06:21:49.178731 kernel: audit: type=1334 audit(1734070909.159:169): prog-id=29 op=LOAD Dec 13 06:21:49.179158 systemd[1]: Finished ldconfig.service. Dec 13 06:21:49.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.191000 audit: BPF prog-id=33 op=LOAD Dec 13 06:21:49.181088 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 06:21:49.184694 systemd[1]: Starting audit-rules.service... Dec 13 06:21:49.186676 systemd[1]: Starting clean-ca-certificates.service... Dec 13 06:21:49.190857 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 06:21:49.194774 systemd[1]: Starting systemd-resolved.service... Dec 13 06:21:49.195000 audit: BPF prog-id=34 op=LOAD Dec 13 06:21:49.198767 systemd[1]: Starting systemd-timesyncd.service... Dec 13 06:21:49.201983 systemd[1]: Starting systemd-update-utmp.service... Dec 13 06:21:49.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.203509 systemd[1]: Finished clean-ca-certificates.service. Dec 13 06:21:49.209774 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.213348 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 06:21:49.215420 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 06:21:49.217560 systemd[1]: Starting modprobe@loop.service... Dec 13 06:21:49.218260 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.218412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:49.218590 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 06:21:49.224300 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.224437 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.224525 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:49.224613 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 06:21:49.228021 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.229638 systemd[1]: Starting modprobe@drm.service... Dec 13 06:21:49.230247 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.230434 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:49.234128 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 06:21:49.234739 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 06:21:49.241000 audit[1140]: SYSTEM_BOOT pid=1140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.242591 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 06:21:49.242783 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 06:21:49.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.245473 systemd[1]: Finished ensure-sysext.service. Dec 13 06:21:49.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.246011 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 06:21:49.246701 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 06:21:49.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.246903 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 06:21:49.254588 systemd[1]: Finished systemd-update-utmp.service. Dec 13 06:21:49.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.256655 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 06:21:49.256833 systemd[1]: Finished modprobe@drm.service. Dec 13 06:21:49.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.257598 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 06:21:49.257864 systemd[1]: Finished modprobe@loop.service. Dec 13 06:21:49.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.258377 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.267364 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 06:21:49.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.269427 systemd[1]: Starting systemd-update-done.service... Dec 13 06:21:49.279045 systemd[1]: Finished systemd-update-done.service. Dec 13 06:21:49.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:21:49.291854 augenrules[1160]: No rules Dec 13 06:21:49.290000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 06:21:49.290000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf0354610 a2=420 a3=0 items=0 ppid=1134 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:21:49.290000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 06:21:49.292189 systemd[1]: Finished audit-rules.service. Dec 13 06:21:49.314953 systemd[1]: Started systemd-timesyncd.service. Dec 13 06:21:49.315468 systemd[1]: Reached target time-set.target. Dec 13 06:21:49.316476 systemd-resolved[1138]: Positive Trust Anchors: Dec 13 06:21:49.317001 systemd-resolved[1138]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 06:21:49.317805 systemd-resolved[1138]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 06:21:49.325438 systemd-resolved[1138]: Using system hostname 'srv-3em3z.gb1.brightbox.com'. Dec 13 06:21:49.327285 systemd[1]: Started systemd-resolved.service. Dec 13 06:21:49.327807 systemd[1]: Reached target network.target. Dec 13 06:21:49.328161 systemd[1]: Reached target nss-lookup.target. Dec 13 06:21:49.328523 systemd[1]: Reached target sysinit.target. Dec 13 06:21:49.328982 systemd[1]: Started motdgen.path. Dec 13 06:21:49.329351 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 06:21:49.338419 systemd[1]: Started logrotate.timer. Dec 13 06:21:49.338898 systemd[1]: Started mdadm.timer. Dec 13 06:21:49.339241 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 06:21:49.339605 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 06:21:49.339645 systemd[1]: Reached target paths.target. Dec 13 06:21:49.339993 systemd[1]: Reached target timers.target. Dec 13 06:21:49.340776 systemd[1]: Listening on dbus.socket. Dec 13 06:21:49.342603 systemd[1]: Starting docker.socket... Dec 13 06:21:49.346332 systemd[1]: Listening on sshd.socket. Dec 13 06:21:49.346963 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:49.347410 systemd[1]: Listening on docker.socket. Dec 13 06:21:49.347837 systemd[1]: Reached target sockets.target. Dec 13 06:21:49.348148 systemd[1]: Reached target basic.target. Dec 13 06:21:49.348537 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.348570 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 06:21:49.349789 systemd[1]: Starting containerd.service... Dec 13 06:21:49.351353 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 06:21:49.353945 systemd[1]: Starting dbus.service... Dec 13 06:21:49.356621 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 06:21:49.360472 systemd[1]: Starting extend-filesystems.service... Dec 13 06:21:49.362866 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 06:21:49.364064 systemd[1]: Starting motdgen.service... Dec 13 06:21:49.366030 systemd[1]: Starting prepare-helm.service... Dec 13 06:21:49.367990 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 06:21:49.370974 systemd[1]: Starting sshd-keygen.service... Dec 13 06:21:49.381483 jq[1173]: false Dec 13 06:21:49.378027 systemd[1]: Starting systemd-logind.service... Dec 13 06:21:49.378510 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 06:21:49.378634 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 06:21:49.379266 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 06:21:49.380240 systemd[1]: Starting update-engine.service... Dec 13 06:21:49.384872 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 06:21:49.392830 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 06:21:49.393121 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 06:21:49.403968 jq[1181]: true Dec 13 06:21:49.421776 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 06:21:49.421992 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 06:21:49.429105 tar[1184]: linux-amd64/helm Dec 13 06:21:49.438840 jq[1187]: true Dec 13 06:21:49.462300 dbus-daemon[1170]: [system] SELinux support is enabled Dec 13 06:21:49.462857 systemd[1]: Started dbus.service. Dec 13 06:21:49.465560 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 06:21:49.465601 systemd[1]: Reached target system-config.target. Dec 13 06:21:49.466048 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 06:21:49.466072 systemd[1]: Reached target user-config.target. Dec 13 06:21:49.466414 dbus-daemon[1170]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 06:21:49.474872 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 06:21:49.481282 systemd[1]: Starting systemd-hostnamed.service... Dec 13 06:21:49.483534 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 06:21:49.483749 systemd[1]: Finished motdgen.service. Dec 13 06:21:49.490814 extend-filesystems[1174]: Found loop1 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda1 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda2 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda3 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found usr Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda4 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda6 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda7 Dec 13 06:21:49.491423 extend-filesystems[1174]: Found vda9 Dec 13 06:21:49.491423 extend-filesystems[1174]: Checking size of /dev/vda9 Dec 13 06:21:49.526484 extend-filesystems[1174]: Resized partition /dev/vda9 Dec 13 06:21:49.532920 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 06:21:49.541588 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 06:21:49.543822 update_engine[1180]: I1213 06:21:49.542971 1180 main.cc:92] Flatcar Update Engine starting Dec 13 06:21:49.547300 systemd[1]: Started update-engine.service. Dec 13 06:21:49.550307 systemd[1]: Started locksmithd.service. Dec 13 06:21:49.565668 update_engine[1180]: I1213 06:21:49.551826 1180 update_check_scheduler.cc:74] Next update check in 11m57s Dec 13 06:21:49.594672 systemd-logind[1179]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 06:21:49.594783 systemd-logind[1179]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 06:21:49.596920 bash[1225]: Updated "/home/core/.ssh/authorized_keys" Dec 13 06:21:49.596610 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 06:21:49.597739 env[1185]: time="2024-12-13T06:21:49.597302716Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 06:21:49.605790 systemd-logind[1179]: New seat seat0. Dec 13 06:21:49.610403 systemd[1]: Started systemd-logind.service. Dec 13 06:21:49.614312 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 06:21:49.614402 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 06:21:49.632729 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 06:21:49.641904 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 06:21:49.641904 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 06:21:49.641904 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 06:21:49.644786 extend-filesystems[1174]: Resized filesystem in /dev/vda9 Dec 13 06:21:49.642788 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 06:21:49.642976 systemd[1]: Finished extend-filesystems.service. Dec 13 06:21:49.667052 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 06:21:49.667215 systemd[1]: Started systemd-hostnamed.service. Dec 13 06:21:49.668218 dbus-daemon[1170]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1212 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 06:21:49.671461 systemd[1]: Starting polkit.service... Dec 13 06:21:49.687934 env[1185]: time="2024-12-13T06:21:49.686938485Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 06:21:49.687934 env[1185]: time="2024-12-13T06:21:49.687804839Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 06:21:49.689002 polkitd[1230]: Started polkitd version 121 Dec 13 06:21:49.691443 env[1185]: time="2024-12-13T06:21:49.691411492Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 06:21:49.691558 env[1185]: time="2024-12-13T06:21:49.691541150Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 06:21:49.691903 env[1185]: time="2024-12-13T06:21:49.691873937Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 06:21:49.691994 env[1185]: time="2024-12-13T06:21:49.691980214Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 06:21:49.692070 env[1185]: time="2024-12-13T06:21:49.692056840Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 06:21:49.692145 env[1185]: time="2024-12-13T06:21:49.692132709Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 06:21:49.692296 env[1185]: time="2024-12-13T06:21:49.692283010Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 06:21:49.692670 env[1185]: time="2024-12-13T06:21:49.692647051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 06:21:49.693585 env[1185]: time="2024-12-13T06:21:49.693008965Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 06:21:49.693691 env[1185]: time="2024-12-13T06:21:49.693674584Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 06:21:49.693847 env[1185]: time="2024-12-13T06:21:49.693830995Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 06:21:49.695254 env[1185]: time="2024-12-13T06:21:49.695234244Z" level=info msg="metadata content store policy set" policy=shared Dec 13 06:21:49.702233 polkitd[1230]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 06:21:49.702417 polkitd[1230]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 06:21:49.703129 env[1185]: time="2024-12-13T06:21:49.703102358Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 06:21:49.703283 env[1185]: time="2024-12-13T06:21:49.703267291Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 06:21:49.703488 env[1185]: time="2024-12-13T06:21:49.703470969Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 06:21:49.703716 env[1185]: time="2024-12-13T06:21:49.703689220Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.703895 polkitd[1230]: Finished loading, compiling and executing 2 rules Dec 13 06:21:49.704768 env[1185]: time="2024-12-13T06:21:49.704746571Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.704870 env[1185]: time="2024-12-13T06:21:49.704853999Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.704961 env[1185]: time="2024-12-13T06:21:49.704947963Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.705036 env[1185]: time="2024-12-13T06:21:49.705023769Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.705109 env[1185]: time="2024-12-13T06:21:49.705096852Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.705183 env[1185]: time="2024-12-13T06:21:49.705171211Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.705245 env[1185]: time="2024-12-13T06:21:49.705232137Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.705316 env[1185]: time="2024-12-13T06:21:49.705304538Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 06:21:49.705504 env[1185]: time="2024-12-13T06:21:49.705488782Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 06:21:49.705885 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 06:21:49.706093 systemd[1]: Started polkit.service. Dec 13 06:21:49.706268 env[1185]: time="2024-12-13T06:21:49.706250857Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 06:21:49.707094 polkitd[1230]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 06:21:49.707672 env[1185]: time="2024-12-13T06:21:49.707650310Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 06:21:49.709546 env[1185]: time="2024-12-13T06:21:49.709527032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.709637 env[1185]: time="2024-12-13T06:21:49.709614106Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 06:21:49.709788 env[1185]: time="2024-12-13T06:21:49.709773833Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.709921 env[1185]: time="2024-12-13T06:21:49.709907621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.709987 env[1185]: time="2024-12-13T06:21:49.709974320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710058 env[1185]: time="2024-12-13T06:21:49.710045576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710119 env[1185]: time="2024-12-13T06:21:49.710106706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710190 env[1185]: time="2024-12-13T06:21:49.710177621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710250 env[1185]: time="2024-12-13T06:21:49.710237635Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710309 env[1185]: time="2024-12-13T06:21:49.710297017Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710422 env[1185]: time="2024-12-13T06:21:49.710410211Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 06:21:49.710606 env[1185]: time="2024-12-13T06:21:49.710591574Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710690 env[1185]: time="2024-12-13T06:21:49.710675992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710786 env[1185]: time="2024-12-13T06:21:49.710773017Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.710897 env[1185]: time="2024-12-13T06:21:49.710884051Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 06:21:49.710982 env[1185]: time="2024-12-13T06:21:49.710965985Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 06:21:49.711045 env[1185]: time="2024-12-13T06:21:49.711032757Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 06:21:49.711128 env[1185]: time="2024-12-13T06:21:49.711114113Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 06:21:49.711217 env[1185]: time="2024-12-13T06:21:49.711203597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 06:21:49.711504 env[1185]: time="2024-12-13T06:21:49.711455269Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 06:21:49.713374 env[1185]: time="2024-12-13T06:21:49.712547465Z" level=info msg="Connect containerd service" Dec 13 06:21:49.713374 env[1185]: time="2024-12-13T06:21:49.712613033Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 06:21:49.717800 env[1185]: time="2024-12-13T06:21:49.717769453Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 06:21:49.720900 env[1185]: time="2024-12-13T06:21:49.720863280Z" level=info msg="Start subscribing containerd event" Dec 13 06:21:49.720982 env[1185]: time="2024-12-13T06:21:49.720926130Z" level=info msg="Start recovering state" Dec 13 06:21:49.721025 env[1185]: time="2024-12-13T06:21:49.721009404Z" level=info msg="Start event monitor" Dec 13 06:21:49.721061 env[1185]: time="2024-12-13T06:21:49.721045689Z" level=info msg="Start snapshots syncer" Dec 13 06:21:49.721090 env[1185]: time="2024-12-13T06:21:49.721058962Z" level=info msg="Start cni network conf syncer for default" Dec 13 06:21:49.721090 env[1185]: time="2024-12-13T06:21:49.721074123Z" level=info msg="Start streaming server" Dec 13 06:21:49.721263 env[1185]: time="2024-12-13T06:21:49.721244871Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 06:21:49.721507 env[1185]: time="2024-12-13T06:21:49.721492035Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 06:21:49.725327 systemd-hostnamed[1212]: Hostname set to (static) Dec 13 06:21:49.726236 systemd-networkd[1029]: eth0: Gained IPv6LL Dec 13 06:21:49.727251 systemd-timesyncd[1139]: Network configuration changed, trying to establish connection. Dec 13 06:21:49.730393 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 06:21:49.731194 systemd[1]: Reached target network-online.target. Dec 13 06:21:49.733670 systemd[1]: Starting kubelet.service... Dec 13 06:21:49.734789 env[1185]: time="2024-12-13T06:21:49.734748654Z" level=info msg="containerd successfully booted in 0.161699s" Dec 13 06:21:49.734784 systemd[1]: Started containerd.service. Dec 13 06:21:50.159834 tar[1184]: linux-amd64/LICENSE Dec 13 06:21:50.160065 tar[1184]: linux-amd64/README.md Dec 13 06:21:50.167026 systemd[1]: Finished prepare-helm.service. Dec 13 06:21:50.322431 locksmithd[1226]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 06:21:50.696921 systemd[1]: Started kubelet.service. Dec 13 06:21:50.780616 sshd_keygen[1199]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 06:21:50.809966 systemd[1]: Finished sshd-keygen.service. Dec 13 06:21:50.812582 systemd[1]: Starting issuegen.service... Dec 13 06:21:50.819475 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 06:21:50.819661 systemd[1]: Finished issuegen.service. Dec 13 06:21:50.821552 systemd[1]: Starting systemd-user-sessions.service... Dec 13 06:21:50.830375 systemd[1]: Finished systemd-user-sessions.service. Dec 13 06:21:50.832476 systemd[1]: Started getty@tty1.service. Dec 13 06:21:50.834404 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 06:21:50.835112 systemd[1]: Reached target getty.target. Dec 13 06:21:51.238867 systemd-timesyncd[1139]: Network configuration changed, trying to establish connection. Dec 13 06:21:51.240893 systemd-networkd[1029]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:17d8:24:19ff:fef4:5f62/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:17d8:24:19ff:fef4:5f62/64 assigned by NDisc. Dec 13 06:21:51.240901 systemd-networkd[1029]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 06:21:51.350965 systemd[1]: Created slice system-sshd.slice. Dec 13 06:21:51.356098 systemd[1]: Started sshd@0-10.244.95.98:22-139.178.89.65:34608.service. Dec 13 06:21:51.463262 kubelet[1251]: E1213 06:21:51.463182 1251 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 06:21:51.465885 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 06:21:51.466277 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 06:21:51.467010 systemd[1]: kubelet.service: Consumed 1.212s CPU time. Dec 13 06:21:52.266414 sshd[1272]: Accepted publickey for core from 139.178.89.65 port 34608 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:21:52.271986 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:21:52.291080 systemd[1]: Created slice user-500.slice. Dec 13 06:21:52.296020 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 06:21:52.300281 systemd-logind[1179]: New session 1 of user core. Dec 13 06:21:52.308680 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 06:21:52.310890 systemd[1]: Starting user@500.service... Dec 13 06:21:52.315463 (systemd)[1275]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:21:52.392775 systemd[1275]: Queued start job for default target default.target. Dec 13 06:21:52.393671 systemd[1275]: Reached target paths.target. Dec 13 06:21:52.393846 systemd[1275]: Reached target sockets.target. Dec 13 06:21:52.393953 systemd[1275]: Reached target timers.target. Dec 13 06:21:52.394047 systemd[1275]: Reached target basic.target. Dec 13 06:21:52.394167 systemd[1275]: Reached target default.target. Dec 13 06:21:52.394279 systemd[1275]: Startup finished in 71ms. Dec 13 06:21:52.394333 systemd[1]: Started user@500.service. Dec 13 06:21:52.398235 systemd[1]: Started session-1.scope. Dec 13 06:21:52.992107 systemd-timesyncd[1139]: Network configuration changed, trying to establish connection. Dec 13 06:21:53.060514 systemd[1]: Started sshd@1-10.244.95.98:22-139.178.89.65:34612.service. Dec 13 06:21:53.962993 sshd[1285]: Accepted publickey for core from 139.178.89.65 port 34612 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:21:53.966685 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:21:53.979117 systemd[1]: Started session-2.scope. Dec 13 06:21:53.980823 systemd-logind[1179]: New session 2 of user core. Dec 13 06:21:54.594204 sshd[1285]: pam_unix(sshd:session): session closed for user core Dec 13 06:21:54.601975 systemd-logind[1179]: Session 2 logged out. Waiting for processes to exit. Dec 13 06:21:54.602685 systemd[1]: sshd@1-10.244.95.98:22-139.178.89.65:34612.service: Deactivated successfully. Dec 13 06:21:54.604558 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 06:21:54.605729 systemd-logind[1179]: Removed session 2. Dec 13 06:21:54.745695 systemd[1]: Started sshd@2-10.244.95.98:22-139.178.89.65:34624.service. Dec 13 06:21:55.655269 sshd[1291]: Accepted publickey for core from 139.178.89.65 port 34624 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:21:55.658977 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:21:55.671422 systemd[1]: Started session-3.scope. Dec 13 06:21:55.671749 systemd-logind[1179]: New session 3 of user core. Dec 13 06:21:56.282877 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 06:21:56.289854 systemd-logind[1179]: Session 3 logged out. Waiting for processes to exit. Dec 13 06:21:56.291297 systemd[1]: sshd@2-10.244.95.98:22-139.178.89.65:34624.service: Deactivated successfully. Dec 13 06:21:56.293120 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 06:21:56.294602 systemd-logind[1179]: Removed session 3. Dec 13 06:21:56.493956 coreos-metadata[1169]: Dec 13 06:21:56.493 WARN failed to locate config-drive, using the metadata service API instead Dec 13 06:21:56.539873 coreos-metadata[1169]: Dec 13 06:21:56.539 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 06:21:56.568456 coreos-metadata[1169]: Dec 13 06:21:56.568 INFO Fetch successful Dec 13 06:21:56.568739 coreos-metadata[1169]: Dec 13 06:21:56.568 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 06:21:56.601193 coreos-metadata[1169]: Dec 13 06:21:56.600 INFO Fetch successful Dec 13 06:21:56.603051 unknown[1169]: wrote ssh authorized keys file for user: core Dec 13 06:21:56.618386 update-ssh-keys[1298]: Updated "/home/core/.ssh/authorized_keys" Dec 13 06:21:56.619352 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 06:21:56.620109 systemd[1]: Reached target multi-user.target. Dec 13 06:21:56.623165 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 06:21:56.636267 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 06:21:56.636452 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 06:21:56.636650 systemd[1]: Startup finished in 935ms (kernel) + 6.598s (initrd) + 12.337s (userspace) = 19.870s. Dec 13 06:22:01.718372 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 06:22:01.718892 systemd[1]: Stopped kubelet.service. Dec 13 06:22:01.718996 systemd[1]: kubelet.service: Consumed 1.212s CPU time. Dec 13 06:22:01.722454 systemd[1]: Starting kubelet.service... Dec 13 06:22:01.834192 systemd[1]: Started kubelet.service. Dec 13 06:22:01.895494 kubelet[1304]: E1213 06:22:01.895347 1304 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 06:22:01.905323 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 06:22:01.905551 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 06:22:06.436210 systemd[1]: Started sshd@3-10.244.95.98:22-139.178.89.65:59424.service. Dec 13 06:22:07.336880 sshd[1312]: Accepted publickey for core from 139.178.89.65 port 59424 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:22:07.341327 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:22:07.353824 systemd-logind[1179]: New session 4 of user core. Dec 13 06:22:07.354434 systemd[1]: Started session-4.scope. Dec 13 06:22:07.964171 sshd[1312]: pam_unix(sshd:session): session closed for user core Dec 13 06:22:07.970784 systemd-logind[1179]: Session 4 logged out. Waiting for processes to exit. Dec 13 06:22:07.971762 systemd[1]: sshd@3-10.244.95.98:22-139.178.89.65:59424.service: Deactivated successfully. Dec 13 06:22:07.973193 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 06:22:07.974317 systemd-logind[1179]: Removed session 4. Dec 13 06:22:08.116543 systemd[1]: Started sshd@4-10.244.95.98:22-139.178.89.65:49208.service. Dec 13 06:22:09.020635 sshd[1318]: Accepted publickey for core from 139.178.89.65 port 49208 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:22:09.024256 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:22:09.033743 systemd-logind[1179]: New session 5 of user core. Dec 13 06:22:09.034595 systemd[1]: Started session-5.scope. Dec 13 06:22:09.641014 sshd[1318]: pam_unix(sshd:session): session closed for user core Dec 13 06:22:09.647835 systemd-logind[1179]: Session 5 logged out. Waiting for processes to exit. Dec 13 06:22:09.648064 systemd[1]: sshd@4-10.244.95.98:22-139.178.89.65:49208.service: Deactivated successfully. Dec 13 06:22:09.649259 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 06:22:09.650891 systemd-logind[1179]: Removed session 5. Dec 13 06:22:09.798349 systemd[1]: Started sshd@5-10.244.95.98:22-139.178.89.65:49220.service. Dec 13 06:22:10.703088 sshd[1324]: Accepted publickey for core from 139.178.89.65 port 49220 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:22:10.707315 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:22:10.719825 systemd-logind[1179]: New session 6 of user core. Dec 13 06:22:10.719977 systemd[1]: Started session-6.scope. Dec 13 06:22:11.335289 sshd[1324]: pam_unix(sshd:session): session closed for user core Dec 13 06:22:11.342821 systemd-logind[1179]: Session 6 logged out. Waiting for processes to exit. Dec 13 06:22:11.343733 systemd[1]: sshd@5-10.244.95.98:22-139.178.89.65:49220.service: Deactivated successfully. Dec 13 06:22:11.344920 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 06:22:11.346233 systemd-logind[1179]: Removed session 6. Dec 13 06:22:11.484916 systemd[1]: Started sshd@6-10.244.95.98:22-139.178.89.65:49236.service. Dec 13 06:22:12.157556 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 06:22:12.158066 systemd[1]: Stopped kubelet.service. Dec 13 06:22:12.161691 systemd[1]: Starting kubelet.service... Dec 13 06:22:12.274951 systemd[1]: Started kubelet.service. Dec 13 06:22:12.346485 kubelet[1336]: E1213 06:22:12.346402 1336 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 06:22:12.348946 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 06:22:12.349128 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 06:22:12.381818 sshd[1330]: Accepted publickey for core from 139.178.89.65 port 49236 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:22:12.383288 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:22:12.392893 systemd-logind[1179]: New session 7 of user core. Dec 13 06:22:12.393262 systemd[1]: Started session-7.scope. Dec 13 06:22:12.876217 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 06:22:12.876563 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 06:22:12.885237 dbus-daemon[1170]: \xd0\u000d\xfcX\xb3U: received setenforce notice (enforcing=684080064) Dec 13 06:22:12.887234 sudo[1343]: pam_unix(sudo:session): session closed for user root Dec 13 06:22:13.034167 sshd[1330]: pam_unix(sshd:session): session closed for user core Dec 13 06:22:13.042519 systemd[1]: sshd@6-10.244.95.98:22-139.178.89.65:49236.service: Deactivated successfully. Dec 13 06:22:13.043777 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 06:22:13.045129 systemd-logind[1179]: Session 7 logged out. Waiting for processes to exit. Dec 13 06:22:13.046887 systemd-logind[1179]: Removed session 7. Dec 13 06:22:13.187603 systemd[1]: Started sshd@7-10.244.95.98:22-139.178.89.65:49238.service. Dec 13 06:22:14.091083 sshd[1347]: Accepted publickey for core from 139.178.89.65 port 49238 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:22:14.094545 sshd[1347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:22:14.104664 systemd-logind[1179]: New session 8 of user core. Dec 13 06:22:14.104930 systemd[1]: Started session-8.scope. Dec 13 06:22:14.577035 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 06:22:14.577925 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 06:22:14.583191 sudo[1351]: pam_unix(sudo:session): session closed for user root Dec 13 06:22:14.592616 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 06:22:14.592965 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 06:22:14.613181 systemd[1]: Stopping audit-rules.service... Dec 13 06:22:14.614000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 06:22:14.615787 kernel: kauditd_printk_skb: 29 callbacks suppressed Dec 13 06:22:14.615900 kernel: audit: type=1305 audit(1734070934.614:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 06:22:14.621977 kernel: audit: type=1300 audit(1734070934.614:197): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe342a3e0 a2=420 a3=0 items=0 ppid=1 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:14.614000 audit[1354]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe342a3e0 a2=420 a3=0 items=0 ppid=1 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:14.614000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 06:22:14.618247 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 06:22:14.622290 auditctl[1354]: No rules Dec 13 06:22:14.618421 systemd[1]: Stopped audit-rules.service. Dec 13 06:22:14.622890 systemd[1]: Starting audit-rules.service... Dec 13 06:22:14.623508 kernel: audit: type=1327 audit(1734070934.614:197): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 06:22:14.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.627742 kernel: audit: type=1131 audit(1734070934.617:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.644522 augenrules[1371]: No rules Dec 13 06:22:14.645251 systemd[1]: Finished audit-rules.service. Dec 13 06:22:14.646298 sudo[1350]: pam_unix(sudo:session): session closed for user root Dec 13 06:22:14.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.650770 kernel: audit: type=1130 audit(1734070934.644:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.650907 kernel: audit: type=1106 audit(1734070934.645:200): pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.645000 audit[1350]: USER_END pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.645000 audit[1350]: CRED_DISP pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.657283 kernel: audit: type=1104 audit(1734070934.645:201): pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.791000 audit[1347]: USER_END pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:14.796560 systemd[1]: sshd@7-10.244.95.98:22-139.178.89.65:49238.service: Deactivated successfully. Dec 13 06:22:14.790252 sshd[1347]: pam_unix(sshd:session): session closed for user core Dec 13 06:22:14.798294 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 06:22:14.792000 audit[1347]: CRED_DISP pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:14.801351 systemd-logind[1179]: Session 8 logged out. Waiting for processes to exit. Dec 13 06:22:14.802806 systemd-logind[1179]: Removed session 8. Dec 13 06:22:14.805925 kernel: audit: type=1106 audit(1734070934.791:202): pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:14.806023 kernel: audit: type=1104 audit(1734070934.792:203): pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:14.806055 kernel: audit: type=1131 audit(1734070934.796:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.95.98:22-139.178.89.65:49238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.95.98:22-139.178.89.65:49238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.98:22-139.178.89.65:49246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:14.941931 systemd[1]: Started sshd@8-10.244.95.98:22-139.178.89.65:49246.service. Dec 13 06:22:15.833000 audit[1377]: USER_ACCT pid=1377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:15.834603 sshd[1377]: Accepted publickey for core from 139.178.89.65 port 49246 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:22:15.836000 audit[1377]: CRED_ACQ pid=1377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:15.836000 audit[1377]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0cdc17d0 a2=3 a3=0 items=0 ppid=1 pid=1377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:15.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:22:15.838852 sshd[1377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:22:15.849605 systemd-logind[1179]: New session 9 of user core. Dec 13 06:22:15.850653 systemd[1]: Started session-9.scope. Dec 13 06:22:15.856000 audit[1377]: USER_START pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:15.858000 audit[1379]: CRED_ACQ pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:16.317000 audit[1380]: USER_ACCT pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:16.318181 sudo[1380]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 06:22:16.317000 audit[1380]: CRED_REFR pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:16.319601 sudo[1380]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 06:22:16.323000 audit[1380]: USER_START pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:16.363683 systemd[1]: Starting docker.service... Dec 13 06:22:16.418996 env[1390]: time="2024-12-13T06:22:16.418929447Z" level=info msg="Starting up" Dec 13 06:22:16.421683 env[1390]: time="2024-12-13T06:22:16.421653050Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 06:22:16.421861 env[1390]: time="2024-12-13T06:22:16.421838102Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 06:22:16.421984 env[1390]: time="2024-12-13T06:22:16.421960343Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 06:22:16.422103 env[1390]: time="2024-12-13T06:22:16.422079591Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 06:22:16.426362 env[1390]: time="2024-12-13T06:22:16.426329896Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 06:22:16.426500 env[1390]: time="2024-12-13T06:22:16.426479058Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 06:22:16.426604 env[1390]: time="2024-12-13T06:22:16.426582901Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 06:22:16.426685 env[1390]: time="2024-12-13T06:22:16.426667221Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 06:22:16.433336 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3937897826-merged.mount: Deactivated successfully. Dec 13 06:22:16.447697 env[1390]: time="2024-12-13T06:22:16.447658789Z" level=info msg="Loading containers: start." Dec 13 06:22:16.525000 audit[1423]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.525000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc3c93d120 a2=0 a3=7ffc3c93d10c items=0 ppid=1390 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.525000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 06:22:16.527000 audit[1425]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.527000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff3681c1d0 a2=0 a3=7fff3681c1bc items=0 ppid=1390 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.527000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 06:22:16.529000 audit[1427]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.529000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc49606e70 a2=0 a3=7ffc49606e5c items=0 ppid=1390 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 06:22:16.531000 audit[1429]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.531000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd0b695810 a2=0 a3=7ffd0b6957fc items=0 ppid=1390 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 06:22:16.534000 audit[1431]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.534000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1c090630 a2=0 a3=7ffc1c09061c items=0 ppid=1390 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 06:22:16.551000 audit[1436]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.551000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1505a700 a2=0 a3=7ffd1505a6ec items=0 ppid=1390 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.551000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 06:22:16.557000 audit[1438]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.557000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3816c150 a2=0 a3=7fff3816c13c items=0 ppid=1390 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 06:22:16.559000 audit[1440]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.559000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffffd5e9d50 a2=0 a3=7ffffd5e9d3c items=0 ppid=1390 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 06:22:16.562000 audit[1442]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.562000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd1857b950 a2=0 a3=7ffd1857b93c items=0 ppid=1390 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 06:22:16.568000 audit[1446]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.568000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdd8da2990 a2=0 a3=7ffdd8da297c items=0 ppid=1390 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 06:22:16.576000 audit[1447]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.576000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff9419a570 a2=0 a3=7fff9419a55c items=0 ppid=1390 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 06:22:16.591726 kernel: Initializing XFRM netlink socket Dec 13 06:22:16.636381 env[1390]: time="2024-12-13T06:22:16.636330230Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 06:22:16.638681 systemd-timesyncd[1139]: Network configuration changed, trying to establish connection. Dec 13 06:22:16.672000 audit[1455]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.672000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcad028b50 a2=0 a3=7ffcad028b3c items=0 ppid=1390 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 06:22:16.693000 audit[1458]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.693000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd6edce790 a2=0 a3=7ffd6edce77c items=0 ppid=1390 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.693000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 06:22:16.697000 audit[1461]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.697000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc259cdfe0 a2=0 a3=7ffc259cdfcc items=0 ppid=1390 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.697000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 06:22:16.700000 audit[1463]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.700000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffed9cf88f0 a2=0 a3=7ffed9cf88dc items=0 ppid=1390 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 06:22:16.702000 audit[1465]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.702000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff68012380 a2=0 a3=7fff6801236c items=0 ppid=1390 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 06:22:16.706000 audit[1467]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.706000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd3644d0f0 a2=0 a3=7ffd3644d0dc items=0 ppid=1390 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 06:22:16.709000 audit[1469]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.709000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc74461de0 a2=0 a3=7ffc74461dcc items=0 ppid=1390 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.709000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 06:22:16.722000 audit[1472]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.722000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffb4e927c0 a2=0 a3=7fffb4e927ac items=0 ppid=1390 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 06:22:16.725000 audit[1474]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.725000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc41683a20 a2=0 a3=7ffc41683a0c items=0 ppid=1390 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.725000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 06:22:16.727000 audit[1476]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.727000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe2fe93fa0 a2=0 a3=7ffe2fe93f8c items=0 ppid=1390 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 06:22:16.729000 audit[1478]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.729000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc4fff5230 a2=0 a3=7ffc4fff521c items=0 ppid=1390 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 06:22:16.731307 systemd-networkd[1029]: docker0: Link UP Dec 13 06:22:16.737000 audit[1482]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.737000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe73d63690 a2=0 a3=7ffe73d6367c items=0 ppid=1390 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 06:22:16.743000 audit[1483]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:16.743000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc6e7020e0 a2=0 a3=7ffc6e7020cc items=0 ppid=1390 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:16.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 06:22:16.744142 env[1390]: time="2024-12-13T06:22:16.744109273Z" level=info msg="Loading containers: done." Dec 13 06:22:16.756094 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck364335200-merged.mount: Deactivated successfully. Dec 13 06:22:16.763084 env[1390]: time="2024-12-13T06:22:16.763043019Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 06:22:16.763263 env[1390]: time="2024-12-13T06:22:16.763242535Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 06:22:16.763414 env[1390]: time="2024-12-13T06:22:16.763384535Z" level=info msg="Daemon has completed initialization" Dec 13 06:22:16.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:16.773126 systemd[1]: Started docker.service. Dec 13 06:22:16.779309 env[1390]: time="2024-12-13T06:22:16.779248845Z" level=info msg="API listen on /run/docker.sock" Dec 13 06:22:16.855791 systemd-timesyncd[1139]: Contacted time server [2a02:390:56d0:900d:e99::]:123 (2.flatcar.pool.ntp.org). Dec 13 06:22:16.855877 systemd-timesyncd[1139]: Initial clock synchronization to Fri 2024-12-13 06:22:17.193142 UTC. Dec 13 06:22:18.198249 env[1185]: time="2024-12-13T06:22:18.198152537Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 06:22:19.449378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2314525504.mount: Deactivated successfully. Dec 13 06:22:21.288853 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 06:22:21.297444 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 06:22:21.297545 kernel: audit: type=1131 audit(1734070941.287:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:21.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:21.314430 kernel: audit: type=1334 audit(1734070941.311:240): prog-id=40 op=UNLOAD Dec 13 06:22:21.314565 kernel: audit: type=1334 audit(1734070941.311:241): prog-id=39 op=UNLOAD Dec 13 06:22:21.311000 audit: BPF prog-id=40 op=UNLOAD Dec 13 06:22:21.311000 audit: BPF prog-id=39 op=UNLOAD Dec 13 06:22:21.311000 audit: BPF prog-id=38 op=UNLOAD Dec 13 06:22:21.316754 kernel: audit: type=1334 audit(1734070941.311:242): prog-id=38 op=UNLOAD Dec 13 06:22:21.767582 env[1185]: time="2024-12-13T06:22:21.767389779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:21.771391 env[1185]: time="2024-12-13T06:22:21.771320394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:21.773389 env[1185]: time="2024-12-13T06:22:21.773347221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:21.774669 env[1185]: time="2024-12-13T06:22:21.774612398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:21.775887 env[1185]: time="2024-12-13T06:22:21.775817678Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 06:22:21.791223 env[1185]: time="2024-12-13T06:22:21.791180404Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 06:22:22.466931 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 06:22:22.477324 kernel: audit: type=1130 audit(1734070942.466:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:22.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:22.467160 systemd[1]: Stopped kubelet.service. Dec 13 06:22:22.469418 systemd[1]: Starting kubelet.service... Dec 13 06:22:22.483999 kernel: audit: type=1131 audit(1734070942.466:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:22.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:22.575692 systemd[1]: Started kubelet.service. Dec 13 06:22:22.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:22.580907 kernel: audit: type=1130 audit(1734070942.575:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:22.749593 kubelet[1534]: E1213 06:22:22.748688 1534 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 06:22:22.752787 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 06:22:22.752937 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 06:22:22.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 06:22:22.760136 kernel: audit: type=1131 audit(1734070942.752:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 06:22:24.676921 env[1185]: time="2024-12-13T06:22:24.676503404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:24.681613 env[1185]: time="2024-12-13T06:22:24.681531264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:24.683028 env[1185]: time="2024-12-13T06:22:24.682985536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:24.685437 env[1185]: time="2024-12-13T06:22:24.685344088Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 06:22:24.688748 env[1185]: time="2024-12-13T06:22:24.686159133Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:24.702350 env[1185]: time="2024-12-13T06:22:24.702316765Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 06:22:26.386789 env[1185]: time="2024-12-13T06:22:26.386519225Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:26.390759 env[1185]: time="2024-12-13T06:22:26.390699867Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:26.394038 env[1185]: time="2024-12-13T06:22:26.393997574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:26.397189 env[1185]: time="2024-12-13T06:22:26.397142088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:26.399600 env[1185]: time="2024-12-13T06:22:26.398464656Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 06:22:26.414108 env[1185]: time="2024-12-13T06:22:26.414074169Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 06:22:27.761779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3058778066.mount: Deactivated successfully. Dec 13 06:22:28.388452 env[1185]: time="2024-12-13T06:22:28.388333881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:28.390001 env[1185]: time="2024-12-13T06:22:28.389941965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:28.391336 env[1185]: time="2024-12-13T06:22:28.391292400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:28.392625 env[1185]: time="2024-12-13T06:22:28.392487888Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:28.393002 env[1185]: time="2024-12-13T06:22:28.392950960Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 06:22:28.408991 env[1185]: time="2024-12-13T06:22:28.408953234Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 06:22:29.011516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1985805617.mount: Deactivated successfully. Dec 13 06:22:30.098093 env[1185]: time="2024-12-13T06:22:30.097914877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.100096 env[1185]: time="2024-12-13T06:22:30.099748205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.102053 env[1185]: time="2024-12-13T06:22:30.102009137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.109685 env[1185]: time="2024-12-13T06:22:30.109638765Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 06:22:30.112914 env[1185]: time="2024-12-13T06:22:30.110765559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.124949 env[1185]: time="2024-12-13T06:22:30.124894897Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 06:22:30.697837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount558543799.mount: Deactivated successfully. Dec 13 06:22:30.702040 env[1185]: time="2024-12-13T06:22:30.701958556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.702966 env[1185]: time="2024-12-13T06:22:30.702928304Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.705491 env[1185]: time="2024-12-13T06:22:30.705465236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.708022 env[1185]: time="2024-12-13T06:22:30.707999857Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:30.709156 env[1185]: time="2024-12-13T06:22:30.709122563Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 06:22:30.721241 env[1185]: time="2024-12-13T06:22:30.721212247Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 06:22:31.344532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2052852186.mount: Deactivated successfully. Dec 13 06:22:32.967258 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 06:22:32.976643 kernel: audit: type=1130 audit(1734070952.966:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:32.982631 kernel: audit: type=1131 audit(1734070952.966:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:32.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:32.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:32.967531 systemd[1]: Stopped kubelet.service. Dec 13 06:22:32.975719 systemd[1]: Starting kubelet.service... Dec 13 06:22:33.248066 systemd[1]: Started kubelet.service. Dec 13 06:22:33.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:33.251776 kernel: audit: type=1130 audit(1734070953.247:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:33.349873 kubelet[1572]: E1213 06:22:33.349823 1572 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 06:22:33.351900 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 06:22:33.352056 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 06:22:33.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 06:22:33.356935 kernel: audit: type=1131 audit(1734070953.351:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 06:22:34.381564 env[1185]: time="2024-12-13T06:22:34.381175848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:34.390074 env[1185]: time="2024-12-13T06:22:34.390028917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:34.391297 env[1185]: time="2024-12-13T06:22:34.391250460Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 06:22:34.394025 env[1185]: time="2024-12-13T06:22:34.393362222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:34.396478 env[1185]: time="2024-12-13T06:22:34.396450289Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:34.780606 update_engine[1180]: I1213 06:22:34.780272 1180 update_attempter.cc:509] Updating boot flags... Dec 13 06:22:38.422567 systemd[1]: Stopped kubelet.service. Dec 13 06:22:38.430366 kernel: audit: type=1130 audit(1734070958.422:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:38.430497 kernel: audit: type=1131 audit(1734070958.422:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:38.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:38.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:38.425846 systemd[1]: Starting kubelet.service... Dec 13 06:22:38.458613 systemd[1]: Reloading. Dec 13 06:22:38.559588 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-12-13T06:22:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 06:22:38.559620 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-12-13T06:22:38Z" level=info msg="torcx already run" Dec 13 06:22:38.660276 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 06:22:38.660489 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 06:22:38.680400 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.758156 kernel: audit: type=1400 audit(1734070958.751:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.758208 kernel: audit: type=1400 audit(1734070958.751:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.758239 kernel: audit: type=1400 audit(1734070958.751:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.769868 kernel: audit: type=1400 audit(1734070958.751:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.769919 kernel: audit: type=1400 audit(1734070958.751:257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.769947 kernel: audit: type=1400 audit(1734070958.751:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.778747 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 06:22:38.778810 kernel: audit: type=1400 audit(1734070958.751:259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit: BPF prog-id=43 op=LOAD Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.759000 audit: BPF prog-id=44 op=LOAD Dec 13 06:22:38.759000 audit: BPF prog-id=24 op=UNLOAD Dec 13 06:22:38.759000 audit: BPF prog-id=25 op=UNLOAD Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.761000 audit: BPF prog-id=45 op=LOAD Dec 13 06:22:38.761000 audit: BPF prog-id=26 op=UNLOAD Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit: BPF prog-id=46 op=LOAD Dec 13 06:22:38.771000 audit: BPF prog-id=27 op=UNLOAD Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit: BPF prog-id=47 op=LOAD Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.772000 audit: BPF prog-id=48 op=LOAD Dec 13 06:22:38.772000 audit: BPF prog-id=28 op=UNLOAD Dec 13 06:22:38.772000 audit: BPF prog-id=29 op=UNLOAD Dec 13 06:22:38.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit: BPF prog-id=50 op=LOAD Dec 13 06:22:38.782000 audit: BPF prog-id=35 op=UNLOAD Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit: BPF prog-id=51 op=LOAD Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.782000 audit: BPF prog-id=52 op=LOAD Dec 13 06:22:38.782000 audit: BPF prog-id=36 op=UNLOAD Dec 13 06:22:38.782000 audit: BPF prog-id=37 op=UNLOAD Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.784000 audit: BPF prog-id=53 op=LOAD Dec 13 06:22:38.784000 audit: BPF prog-id=41 op=UNLOAD Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit: BPF prog-id=54 op=LOAD Dec 13 06:22:38.786000 audit: BPF prog-id=30 op=UNLOAD Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit: BPF prog-id=55 op=LOAD Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.786000 audit: BPF prog-id=56 op=LOAD Dec 13 06:22:38.786000 audit: BPF prog-id=31 op=UNLOAD Dec 13 06:22:38.786000 audit: BPF prog-id=32 op=UNLOAD Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:38.788000 audit: BPF prog-id=57 op=LOAD Dec 13 06:22:38.788000 audit: BPF prog-id=34 op=UNLOAD Dec 13 06:22:38.809362 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 06:22:38.809658 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 06:22:38.810160 systemd[1]: Stopped kubelet.service. Dec 13 06:22:38.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 06:22:38.813610 systemd[1]: Starting kubelet.service... Dec 13 06:22:38.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:38.968882 systemd[1]: Started kubelet.service. Dec 13 06:22:39.038894 kubelet[1727]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 06:22:39.039321 kubelet[1727]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 06:22:39.039381 kubelet[1727]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 06:22:39.040718 kubelet[1727]: I1213 06:22:39.040659 1727 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 06:22:39.713148 kubelet[1727]: I1213 06:22:39.713118 1727 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 06:22:39.713596 kubelet[1727]: I1213 06:22:39.713584 1727 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 06:22:39.713970 kubelet[1727]: I1213 06:22:39.713956 1727 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 06:22:39.736279 kubelet[1727]: E1213 06:22:39.736253 1727 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.244.95.98:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.737346 kubelet[1727]: I1213 06:22:39.737330 1727 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 06:22:39.749786 kubelet[1727]: I1213 06:22:39.749766 1727 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 06:22:39.751464 kubelet[1727]: I1213 06:22:39.751443 1727 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 06:22:39.751783 kubelet[1727]: I1213 06:22:39.751763 1727 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 06:22:39.752570 kubelet[1727]: I1213 06:22:39.752553 1727 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 06:22:39.752666 kubelet[1727]: I1213 06:22:39.752654 1727 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 06:22:39.752884 kubelet[1727]: I1213 06:22:39.752872 1727 state_mem.go:36] "Initialized new in-memory state store" Dec 13 06:22:39.753086 kubelet[1727]: I1213 06:22:39.753076 1727 kubelet.go:396] "Attempting to sync node with API server" Dec 13 06:22:39.753178 kubelet[1727]: I1213 06:22:39.753168 1727 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 06:22:39.753280 kubelet[1727]: I1213 06:22:39.753271 1727 kubelet.go:312] "Adding apiserver pod source" Dec 13 06:22:39.753365 kubelet[1727]: I1213 06:22:39.753356 1727 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 06:22:39.753671 kubelet[1727]: W1213 06:22:39.753622 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.244.95.98:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3em3z.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.753758 kubelet[1727]: E1213 06:22:39.753681 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.244.95.98:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3em3z.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.754959 kubelet[1727]: I1213 06:22:39.754944 1727 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 06:22:39.763791 kubelet[1727]: I1213 06:22:39.763770 1727 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 06:22:39.763968 kubelet[1727]: W1213 06:22:39.763955 1727 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 06:22:39.764619 kubelet[1727]: I1213 06:22:39.764602 1727 server.go:1256] "Started kubelet" Dec 13 06:22:39.764824 kubelet[1727]: W1213 06:22:39.764794 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.244.95.98:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.764906 kubelet[1727]: E1213 06:22:39.764897 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.244.95.98:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.766941 kubelet[1727]: I1213 06:22:39.766869 1727 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 06:22:39.767730 kubelet[1727]: I1213 06:22:39.767681 1727 server.go:461] "Adding debug handlers to kubelet server" Dec 13 06:22:39.769000 audit[1727]: AVC avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:39.769000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 06:22:39.769000 audit[1727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b47770 a1=c000b2b4e8 a2=c000b47740 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.769000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 06:22:39.769000 audit[1727]: AVC avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:39.769000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 06:22:39.769000 audit[1727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b43140 a1=c000b2b500 a2=c000b47800 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.769000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 06:22:39.771448 kubelet[1727]: I1213 06:22:39.770025 1727 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 06:22:39.771448 kubelet[1727]: I1213 06:22:39.770074 1727 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 06:22:39.771448 kubelet[1727]: I1213 06:22:39.770142 1727 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 06:22:39.773000 audit[1738]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.773000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd169de7a0 a2=0 a3=7ffd169de78c items=0 ppid=1727 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 06:22:39.774000 audit[1739]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.774000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9b8fcf70 a2=0 a3=7ffc9b8fcf5c items=0 ppid=1727 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 06:22:39.779740 kubelet[1727]: I1213 06:22:39.779642 1727 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 06:22:39.780055 kubelet[1727]: I1213 06:22:39.780034 1727 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 06:22:39.782513 kubelet[1727]: I1213 06:22:39.782492 1727 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 06:22:39.783841 kubelet[1727]: E1213 06:22:39.783803 1727 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.95.98:6443/api/v1/namespaces/default/events\": dial tcp 10.244.95.98:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-3em3z.gb1.brightbox.com.1810a859b4169f5f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-3em3z.gb1.brightbox.com,UID:srv-3em3z.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-3em3z.gb1.brightbox.com,},FirstTimestamp:2024-12-13 06:22:39.764578143 +0000 UTC m=+0.786569489,LastTimestamp:2024-12-13 06:22:39.764578143 +0000 UTC m=+0.786569489,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-3em3z.gb1.brightbox.com,}" Dec 13 06:22:39.783000 audit[1741]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.783000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc32c972c0 a2=0 a3=7ffc32c972ac items=0 ppid=1727 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 06:22:39.788693 kubelet[1727]: I1213 06:22:39.788671 1727 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 06:22:39.788878 kubelet[1727]: I1213 06:22:39.788867 1727 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 06:22:39.789000 audit[1743]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.789000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd677b8c10 a2=0 a3=7ffd677b8bfc items=0 ppid=1727 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 06:22:39.791299 kubelet[1727]: E1213 06:22:39.790955 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3em3z.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.98:6443: connect: connection refused" interval="200ms" Dec 13 06:22:39.791745 kubelet[1727]: W1213 06:22:39.791645 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.244.95.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.791802 kubelet[1727]: E1213 06:22:39.791766 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.244.95.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.794206 kubelet[1727]: I1213 06:22:39.794021 1727 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 06:22:39.797488 kubelet[1727]: I1213 06:22:39.797469 1727 factory.go:221] Registration of the containerd container factory successfully Dec 13 06:22:39.797488 kubelet[1727]: I1213 06:22:39.797486 1727 factory.go:221] Registration of the systemd container factory successfully Dec 13 06:22:39.804000 audit[1747]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.804000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffecce83ca0 a2=0 a3=7ffecce83c8c items=0 ppid=1727 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 06:22:39.805199 kubelet[1727]: I1213 06:22:39.805183 1727 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 06:22:39.805000 audit[1748]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:22:39.805000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe052dd220 a2=0 a3=7ffe052dd20c items=0 ppid=1727 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 06:22:39.806394 kubelet[1727]: I1213 06:22:39.806381 1727 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 06:22:39.806492 kubelet[1727]: I1213 06:22:39.806482 1727 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 06:22:39.806572 kubelet[1727]: I1213 06:22:39.806562 1727 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 06:22:39.806681 kubelet[1727]: E1213 06:22:39.806671 1727 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 06:22:39.806000 audit[1749]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.806000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf8a8c220 a2=0 a3=7ffdf8a8c20c items=0 ppid=1727 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 06:22:39.808000 audit[1750]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.808000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff8f02680 a2=0 a3=7ffff8f0266c items=0 ppid=1727 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 06:22:39.809000 audit[1751]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:22:39.809000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbc743640 a2=0 a3=7ffcbc74362c items=0 ppid=1727 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 06:22:39.810000 audit[1752]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:22:39.810000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec14413d0 a2=0 a3=7ffec14413bc items=0 ppid=1727 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 06:22:39.811000 audit[1753]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:22:39.811000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffac121e80 a2=0 a3=7fffac121e6c items=0 ppid=1727 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 06:22:39.812000 audit[1754]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:22:39.812000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe98360230 a2=0 a3=7ffe9836021c items=0 ppid=1727 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 06:22:39.823772 kubelet[1727]: W1213 06:22:39.823693 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.244.95.98:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.823915 kubelet[1727]: E1213 06:22:39.823903 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.244.95.98:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:39.831236 kubelet[1727]: I1213 06:22:39.831208 1727 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 06:22:39.831236 kubelet[1727]: I1213 06:22:39.831235 1727 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 06:22:39.831363 kubelet[1727]: I1213 06:22:39.831272 1727 state_mem.go:36] "Initialized new in-memory state store" Dec 13 06:22:39.832542 kubelet[1727]: I1213 06:22:39.832514 1727 policy_none.go:49] "None policy: Start" Dec 13 06:22:39.833080 kubelet[1727]: I1213 06:22:39.833055 1727 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 06:22:39.833191 kubelet[1727]: I1213 06:22:39.833180 1727 state_mem.go:35] "Initializing new in-memory state store" Dec 13 06:22:39.839496 systemd[1]: Created slice kubepods.slice. Dec 13 06:22:39.847603 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 06:22:39.851587 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 06:22:39.861533 kubelet[1727]: I1213 06:22:39.861514 1727 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 06:22:39.860000 audit[1727]: AVC avc: denied { mac_admin } for pid=1727 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:39.860000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 06:22:39.860000 audit[1727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00087e900 a1=c000e5f050 a2=c00087e8d0 a3=25 items=0 ppid=1 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:39.860000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 06:22:39.862034 kubelet[1727]: I1213 06:22:39.862019 1727 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 06:22:39.863167 kubelet[1727]: I1213 06:22:39.863062 1727 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 06:22:39.865260 kubelet[1727]: E1213 06:22:39.865247 1727 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-3em3z.gb1.brightbox.com\" not found" Dec 13 06:22:39.887957 kubelet[1727]: I1213 06:22:39.887915 1727 kubelet_node_status.go:73] "Attempting to register node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.888617 kubelet[1727]: E1213 06:22:39.888585 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.95.98:6443/api/v1/nodes\": dial tcp 10.244.95.98:6443: connect: connection refused" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.907417 kubelet[1727]: I1213 06:22:39.907318 1727 topology_manager.go:215] "Topology Admit Handler" podUID="15be9cf7b1139d7e2b218d5b96550407" podNamespace="kube-system" podName="kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.917055 kubelet[1727]: I1213 06:22:39.917020 1727 topology_manager.go:215] "Topology Admit Handler" podUID="97cc9f5e1e58eb5ee4cad122716a195f" podNamespace="kube-system" podName="kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.920136 kubelet[1727]: I1213 06:22:39.920098 1727 topology_manager.go:215] "Topology Admit Handler" podUID="c1d4d9a8daecbd12a44f2926d9e15619" podNamespace="kube-system" podName="kube-scheduler-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.928972 systemd[1]: Created slice kubepods-burstable-pod15be9cf7b1139d7e2b218d5b96550407.slice. Dec 13 06:22:39.949367 systemd[1]: Created slice kubepods-burstable-podc1d4d9a8daecbd12a44f2926d9e15619.slice. Dec 13 06:22:39.958107 systemd[1]: Created slice kubepods-burstable-pod97cc9f5e1e58eb5ee4cad122716a195f.slice. Dec 13 06:22:39.990578 kubelet[1727]: I1213 06:22:39.990509 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-ca-certs\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990779 kubelet[1727]: I1213 06:22:39.990639 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-flexvolume-dir\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990779 kubelet[1727]: I1213 06:22:39.990698 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-k8s-certs\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990779 kubelet[1727]: I1213 06:22:39.990767 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c1d4d9a8daecbd12a44f2926d9e15619-kubeconfig\") pod \"kube-scheduler-srv-3em3z.gb1.brightbox.com\" (UID: \"c1d4d9a8daecbd12a44f2926d9e15619\") " pod="kube-system/kube-scheduler-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990892 kubelet[1727]: I1213 06:22:39.990802 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/15be9cf7b1139d7e2b218d5b96550407-ca-certs\") pod \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" (UID: \"15be9cf7b1139d7e2b218d5b96550407\") " pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990892 kubelet[1727]: I1213 06:22:39.990838 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/15be9cf7b1139d7e2b218d5b96550407-k8s-certs\") pod \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" (UID: \"15be9cf7b1139d7e2b218d5b96550407\") " pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990892 kubelet[1727]: I1213 06:22:39.990876 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/15be9cf7b1139d7e2b218d5b96550407-usr-share-ca-certificates\") pod \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" (UID: \"15be9cf7b1139d7e2b218d5b96550407\") " pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990989 kubelet[1727]: I1213 06:22:39.990910 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-kubeconfig\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.990989 kubelet[1727]: I1213 06:22:39.990949 1727 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:39.991786 kubelet[1727]: E1213 06:22:39.991766 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3em3z.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.98:6443: connect: connection refused" interval="400ms" Dec 13 06:22:40.094108 kubelet[1727]: I1213 06:22:40.094051 1727 kubelet_node_status.go:73] "Attempting to register node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:40.096016 kubelet[1727]: E1213 06:22:40.095959 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.95.98:6443/api/v1/nodes\": dial tcp 10.244.95.98:6443: connect: connection refused" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:40.248989 env[1185]: time="2024-12-13T06:22:40.248641401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-3em3z.gb1.brightbox.com,Uid:15be9cf7b1139d7e2b218d5b96550407,Namespace:kube-system,Attempt:0,}" Dec 13 06:22:40.258525 env[1185]: time="2024-12-13T06:22:40.257943599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-3em3z.gb1.brightbox.com,Uid:c1d4d9a8daecbd12a44f2926d9e15619,Namespace:kube-system,Attempt:0,}" Dec 13 06:22:40.261991 env[1185]: time="2024-12-13T06:22:40.261927901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-3em3z.gb1.brightbox.com,Uid:97cc9f5e1e58eb5ee4cad122716a195f,Namespace:kube-system,Attempt:0,}" Dec 13 06:22:40.392685 kubelet[1727]: E1213 06:22:40.392595 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3em3z.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.98:6443: connect: connection refused" interval="800ms" Dec 13 06:22:40.500368 kubelet[1727]: I1213 06:22:40.500188 1727 kubelet_node_status.go:73] "Attempting to register node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:40.501431 kubelet[1727]: E1213 06:22:40.501371 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.95.98:6443/api/v1/nodes\": dial tcp 10.244.95.98:6443: connect: connection refused" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:40.857517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1029433315.mount: Deactivated successfully. Dec 13 06:22:40.867881 env[1185]: time="2024-12-13T06:22:40.867836350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.870202 env[1185]: time="2024-12-13T06:22:40.870165184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.870781 env[1185]: time="2024-12-13T06:22:40.870758244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.871345 env[1185]: time="2024-12-13T06:22:40.871325577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.871942 env[1185]: time="2024-12-13T06:22:40.871921126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.874680 env[1185]: time="2024-12-13T06:22:40.874655793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.877146 env[1185]: time="2024-12-13T06:22:40.877119812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.877702 env[1185]: time="2024-12-13T06:22:40.877682459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.878281 env[1185]: time="2024-12-13T06:22:40.878259381Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.878852 env[1185]: time="2024-12-13T06:22:40.878831409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.879466 env[1185]: time="2024-12-13T06:22:40.879417746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.880590 env[1185]: time="2024-12-13T06:22:40.880566127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:22:40.901294 env[1185]: time="2024-12-13T06:22:40.900966153Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:22:40.901294 env[1185]: time="2024-12-13T06:22:40.901041765Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:22:40.901294 env[1185]: time="2024-12-13T06:22:40.901139971Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:22:40.901942 env[1185]: time="2024-12-13T06:22:40.901907745Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7fd0809aaa8daed144740bcb75d2f11bfaba6bfa68d43ad62548201d2e53eb27 pid=1768 runtime=io.containerd.runc.v2 Dec 13 06:22:40.905129 env[1185]: time="2024-12-13T06:22:40.905054527Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:22:40.905358 env[1185]: time="2024-12-13T06:22:40.905325027Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:22:40.905486 env[1185]: time="2024-12-13T06:22:40.905464123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:22:40.906990 env[1185]: time="2024-12-13T06:22:40.906924834Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/295092137a9e794549371d413c55ca39aa37fa6243916ccf63282575c0ce1619 pid=1783 runtime=io.containerd.runc.v2 Dec 13 06:22:40.926788 env[1185]: time="2024-12-13T06:22:40.926721302Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:22:40.927001 env[1185]: time="2024-12-13T06:22:40.926759822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:22:40.927001 env[1185]: time="2024-12-13T06:22:40.926783160Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:22:40.927001 env[1185]: time="2024-12-13T06:22:40.926901405Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b05cb7405cb1dbf8916c953fc7d5c22d29bedc38fab35f89a5071b56a3138d0 pid=1804 runtime=io.containerd.runc.v2 Dec 13 06:22:40.938931 systemd[1]: Started cri-containerd-295092137a9e794549371d413c55ca39aa37fa6243916ccf63282575c0ce1619.scope. Dec 13 06:22:40.959283 systemd[1]: Started cri-containerd-7fd0809aaa8daed144740bcb75d2f11bfaba6bfa68d43ad62548201d2e53eb27.scope. Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.962000 audit: BPF prog-id=58 op=LOAD Dec 13 06:22:40.964000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.964000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353039323133376139653739343534393337316434313363353563 Dec 13 06:22:40.964000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.964000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353039323133376139653739343534393337316434313363353563 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit: BPF prog-id=59 op=LOAD Dec 13 06:22:40.965000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002cbf80 items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353039323133376139653739343534393337316434313363353563 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit: BPF prog-id=60 op=LOAD Dec 13 06:22:40.965000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002cbfc8 items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353039323133376139653739343534393337316434313363353563 Dec 13 06:22:40.965000 audit: BPF prog-id=60 op=UNLOAD Dec 13 06:22:40.965000 audit: BPF prog-id=59 op=UNLOAD Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.965000 audit: BPF prog-id=61 op=LOAD Dec 13 06:22:40.965000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003523d8 items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239353039323133376139653739343534393337316434313363353563 Dec 13 06:22:40.988250 systemd[1]: Started cri-containerd-7b05cb7405cb1dbf8916c953fc7d5c22d29bedc38fab35f89a5071b56a3138d0.scope. Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.989000 audit: BPF prog-id=62 op=LOAD Dec 13 06:22:40.991000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.991000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1768 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643038303961616138646165643134343734306263623735643266 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1768 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643038303961616138646165643134343734306263623735643266 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit: BPF prog-id=63 op=LOAD Dec 13 06:22:40.994000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca620 items=0 ppid=1768 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643038303961616138646165643134343734306263623735643266 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit: BPF prog-id=64 op=LOAD Dec 13 06:22:40.994000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca668 items=0 ppid=1768 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643038303961616138646165643134343734306263623735643266 Dec 13 06:22:40.994000 audit: BPF prog-id=64 op=UNLOAD Dec 13 06:22:40.994000 audit: BPF prog-id=63 op=UNLOAD Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:40.994000 audit: BPF prog-id=65 op=LOAD Dec 13 06:22:40.994000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003caa78 items=0 ppid=1768 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:40.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643038303961616138646165643134343734306263623735643266 Dec 13 06:22:41.016457 env[1185]: time="2024-12-13T06:22:41.016414743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-3em3z.gb1.brightbox.com,Uid:97cc9f5e1e58eb5ee4cad122716a195f,Namespace:kube-system,Attempt:0,} returns sandbox id \"295092137a9e794549371d413c55ca39aa37fa6243916ccf63282575c0ce1619\"" Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.018000 audit: BPF prog-id=66 op=LOAD Dec 13 06:22:41.019000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.019000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=1804 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303563623734303563623164626638393136633935336663376435 Dec 13 06:22:41.019000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.019000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=1804 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303563623734303563623164626638393136633935336663376435 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit: BPF prog-id=67 op=LOAD Dec 13 06:22:41.020000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0001eba20 items=0 ppid=1804 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303563623734303563623164626638393136633935336663376435 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit: BPF prog-id=68 op=LOAD Dec 13 06:22:41.020000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0001eba68 items=0 ppid=1804 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303563623734303563623164626638393136633935336663376435 Dec 13 06:22:41.020000 audit: BPF prog-id=68 op=UNLOAD Dec 13 06:22:41.020000 audit: BPF prog-id=67 op=UNLOAD Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.020000 audit: BPF prog-id=69 op=LOAD Dec 13 06:22:41.020000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0001ebe78 items=0 ppid=1804 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762303563623734303563623164626638393136633935336663376435 Dec 13 06:22:41.027091 env[1185]: time="2024-12-13T06:22:41.027060689Z" level=info msg="CreateContainer within sandbox \"295092137a9e794549371d413c55ca39aa37fa6243916ccf63282575c0ce1619\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 06:22:41.051348 env[1185]: time="2024-12-13T06:22:41.051305071Z" level=info msg="CreateContainer within sandbox \"295092137a9e794549371d413c55ca39aa37fa6243916ccf63282575c0ce1619\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"77a5367d93ad1595051f686f18b456f3e2dddb4d0663b2d49af8ad894032b0c0\"" Dec 13 06:22:41.051933 env[1185]: time="2024-12-13T06:22:41.051906982Z" level=info msg="StartContainer for \"77a5367d93ad1595051f686f18b456f3e2dddb4d0663b2d49af8ad894032b0c0\"" Dec 13 06:22:41.061614 env[1185]: time="2024-12-13T06:22:41.061569846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-3em3z.gb1.brightbox.com,Uid:15be9cf7b1139d7e2b218d5b96550407,Namespace:kube-system,Attempt:0,} returns sandbox id \"7b05cb7405cb1dbf8916c953fc7d5c22d29bedc38fab35f89a5071b56a3138d0\"" Dec 13 06:22:41.063456 kubelet[1727]: W1213 06:22:41.063390 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.244.95.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.063456 kubelet[1727]: E1213 06:22:41.063431 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.244.95.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.066123 env[1185]: time="2024-12-13T06:22:41.065529655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-3em3z.gb1.brightbox.com,Uid:c1d4d9a8daecbd12a44f2926d9e15619,Namespace:kube-system,Attempt:0,} returns sandbox id \"7fd0809aaa8daed144740bcb75d2f11bfaba6bfa68d43ad62548201d2e53eb27\"" Dec 13 06:22:41.066601 env[1185]: time="2024-12-13T06:22:41.066329366Z" level=info msg="CreateContainer within sandbox \"7b05cb7405cb1dbf8916c953fc7d5c22d29bedc38fab35f89a5071b56a3138d0\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 06:22:41.068204 env[1185]: time="2024-12-13T06:22:41.068177778Z" level=info msg="CreateContainer within sandbox \"7fd0809aaa8daed144740bcb75d2f11bfaba6bfa68d43ad62548201d2e53eb27\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 06:22:41.074979 env[1185]: time="2024-12-13T06:22:41.074944020Z" level=info msg="CreateContainer within sandbox \"7fd0809aaa8daed144740bcb75d2f11bfaba6bfa68d43ad62548201d2e53eb27\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"09fbda417890b66490e2c8ff06b4c466e5260e86fe039bf7721e12c03a4973e8\"" Dec 13 06:22:41.075360 env[1185]: time="2024-12-13T06:22:41.075338146Z" level=info msg="StartContainer for \"09fbda417890b66490e2c8ff06b4c466e5260e86fe039bf7721e12c03a4973e8\"" Dec 13 06:22:41.077966 kubelet[1727]: W1213 06:22:41.077866 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.244.95.98:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.077966 kubelet[1727]: E1213 06:22:41.077946 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.244.95.98:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.079781 env[1185]: time="2024-12-13T06:22:41.079748117Z" level=info msg="CreateContainer within sandbox \"7b05cb7405cb1dbf8916c953fc7d5c22d29bedc38fab35f89a5071b56a3138d0\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3224c3eccf4b2c309007ebd303984848ff3eec88fc2fc5b21d98647a41aaaaf8\"" Dec 13 06:22:41.080094 env[1185]: time="2024-12-13T06:22:41.080067586Z" level=info msg="StartContainer for \"3224c3eccf4b2c309007ebd303984848ff3eec88fc2fc5b21d98647a41aaaaf8\"" Dec 13 06:22:41.084786 systemd[1]: Started cri-containerd-77a5367d93ad1595051f686f18b456f3e2dddb4d0663b2d49af8ad894032b0c0.scope. Dec 13 06:22:41.101302 systemd[1]: Started cri-containerd-09fbda417890b66490e2c8ff06b4c466e5260e86fe039bf7721e12c03a4973e8.scope. Dec 13 06:22:41.120643 systemd[1]: Started cri-containerd-3224c3eccf4b2c309007ebd303984848ff3eec88fc2fc5b21d98647a41aaaaf8.scope. Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.126000 audit: BPF prog-id=70 op=LOAD Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1768 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039666264613431373839306236363439306532633866663036623463 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1768 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039666264613431373839306236363439306532633866663036623463 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit: BPF prog-id=71 op=LOAD Dec 13 06:22:41.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027bdc0 items=0 ppid=1768 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039666264613431373839306236363439306532633866663036623463 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit: BPF prog-id=72 op=LOAD Dec 13 06:22:41.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027be08 items=0 ppid=1768 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039666264613431373839306236363439306532633866663036623463 Dec 13 06:22:41.127000 audit: BPF prog-id=72 op=UNLOAD Dec 13 06:22:41.127000 audit: BPF prog-id=71 op=UNLOAD Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.127000 audit: BPF prog-id=73 op=LOAD Dec 13 06:22:41.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f6218 items=0 ppid=1768 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039666264613431373839306236363439306532633866663036623463 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.139000 audit: BPF prog-id=74 op=LOAD Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1783 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737613533363764393361643135393530353166363836663138623435 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1783 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737613533363764393361643135393530353166363836663138623435 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit: BPF prog-id=75 op=LOAD Dec 13 06:22:41.140000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002dde30 items=0 ppid=1783 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737613533363764393361643135393530353166363836663138623435 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit: BPF prog-id=76 op=LOAD Dec 13 06:22:41.140000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002dde78 items=0 ppid=1783 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737613533363764393361643135393530353166363836663138623435 Dec 13 06:22:41.140000 audit: BPF prog-id=76 op=UNLOAD Dec 13 06:22:41.140000 audit: BPF prog-id=75 op=UNLOAD Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.140000 audit: BPF prog-id=77 op=LOAD Dec 13 06:22:41.140000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6288 items=0 ppid=1783 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737613533363764393361643135393530353166363836663138623435 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.157000 audit: BPF prog-id=78 op=LOAD Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1804 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332323463336563636634623263333039303037656264333033393834 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1804 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332323463336563636634623263333039303037656264333033393834 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit: BPF prog-id=79 op=LOAD Dec 13 06:22:41.158000 audit[1918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000354720 items=0 ppid=1804 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332323463336563636634623263333039303037656264333033393834 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit: BPF prog-id=80 op=LOAD Dec 13 06:22:41.158000 audit[1918]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000354768 items=0 ppid=1804 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332323463336563636634623263333039303037656264333033393834 Dec 13 06:22:41.158000 audit: BPF prog-id=80 op=UNLOAD Dec 13 06:22:41.158000 audit: BPF prog-id=79 op=UNLOAD Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { perfmon } for pid=1918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit[1918]: AVC avc: denied { bpf } for pid=1918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:41.158000 audit: BPF prog-id=81 op=LOAD Dec 13 06:22:41.158000 audit[1918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354b78 items=0 ppid=1804 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:41.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332323463336563636634623263333039303037656264333033393834 Dec 13 06:22:41.165316 env[1185]: time="2024-12-13T06:22:41.165275025Z" level=info msg="StartContainer for \"09fbda417890b66490e2c8ff06b4c466e5260e86fe039bf7721e12c03a4973e8\" returns successfully" Dec 13 06:22:41.193718 kubelet[1727]: E1213 06:22:41.193660 1727 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.95.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-3em3z.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.95.98:6443: connect: connection refused" interval="1.6s" Dec 13 06:22:41.217472 env[1185]: time="2024-12-13T06:22:41.217421295Z" level=info msg="StartContainer for \"77a5367d93ad1595051f686f18b456f3e2dddb4d0663b2d49af8ad894032b0c0\" returns successfully" Dec 13 06:22:41.236310 kubelet[1727]: W1213 06:22:41.236214 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.244.95.98:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3em3z.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.236607 env[1185]: time="2024-12-13T06:22:41.236575227Z" level=info msg="StartContainer for \"3224c3eccf4b2c309007ebd303984848ff3eec88fc2fc5b21d98647a41aaaaf8\" returns successfully" Dec 13 06:22:41.236892 kubelet[1727]: E1213 06:22:41.236867 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.244.95.98:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-3em3z.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.304244 kubelet[1727]: I1213 06:22:41.304218 1727 kubelet_node_status.go:73] "Attempting to register node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:41.304797 kubelet[1727]: E1213 06:22:41.304778 1727 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.95.98:6443/api/v1/nodes\": dial tcp 10.244.95.98:6443: connect: connection refused" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:41.425568 kubelet[1727]: W1213 06:22:41.425429 1727 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.244.95.98:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.425784 kubelet[1727]: E1213 06:22:41.425771 1727 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.244.95.98:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:41.929595 kubelet[1727]: E1213 06:22:41.929563 1727 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.244.95.98:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.244.95.98:6443: connect: connection refused Dec 13 06:22:42.802000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:42.802000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000958510 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:42.802000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:42.802000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:42.802000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00055a1c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:42.802000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:42.907698 kubelet[1727]: I1213 06:22:42.907667 1727 kubelet_node_status.go:73] "Attempting to register node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:43.497641 kernel: kauditd_printk_skb: 576 callbacks suppressed Dec 13 06:22:43.498098 kernel: audit: type=1400 audit(1734070963.489:545): avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526915 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.489000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526915 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.493000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.493000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004d303c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.506767 kernel: audit: type=1400 audit(1734070963.493:546): avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.506864 kernel: audit: type=1300 audit(1734070963.493:546): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004d303c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.506907 kernel: audit: type=1327 audit(1734070963.493:546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.493000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.493000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.493000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004f5f2c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.518543 kernel: audit: type=1400 audit(1734070963.493:547): avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.518617 kernel: audit: type=1300 audit(1734070963.493:547): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004f5f2c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.493000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.524725 kernel: audit: type=1327 audit(1734070963.493:547): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.489000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004dffc80 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.489000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.533015 kernel: audit: type=1300 audit(1734070963.489:545): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004dffc80 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.533082 kernel: audit: type=1327 audit(1734070963.489:545): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.533110 kernel: audit: type=1400 audit(1734070963.501:548): avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526921 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.501000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526921 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.501000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004dffd10 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.554000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.554000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0043ec960 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.554000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:43.554000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006daec00 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:22:43.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:22:43.590486 kubelet[1727]: E1213 06:22:43.590420 1727 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-3em3z.gb1.brightbox.com\" not found" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:43.670284 kubelet[1727]: I1213 06:22:43.670228 1727 kubelet_node_status.go:76] "Successfully registered node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:43.757006 kubelet[1727]: I1213 06:22:43.756854 1727 apiserver.go:52] "Watching apiserver" Dec 13 06:22:43.789491 kubelet[1727]: I1213 06:22:43.789457 1727 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 06:22:44.079748 kubelet[1727]: E1213 06:22:44.079485 1727 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:46.666835 systemd[1]: Reloading. Dec 13 06:22:46.794582 /usr/lib/systemd/system-generators/torcx-generator[2015]: time="2024-12-13T06:22:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 06:22:46.797385 /usr/lib/systemd/system-generators/torcx-generator[2015]: time="2024-12-13T06:22:46Z" level=info msg="torcx already run" Dec 13 06:22:46.917356 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 06:22:46.917911 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 06:22:46.937858 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.022000 audit: BPF prog-id=82 op=LOAD Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.023000 audit: BPF prog-id=83 op=LOAD Dec 13 06:22:47.023000 audit: BPF prog-id=43 op=UNLOAD Dec 13 06:22:47.023000 audit: BPF prog-id=44 op=UNLOAD Dec 13 06:22:47.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.025000 audit: BPF prog-id=84 op=LOAD Dec 13 06:22:47.025000 audit: BPF prog-id=45 op=UNLOAD Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.032000 audit: BPF prog-id=85 op=LOAD Dec 13 06:22:47.032000 audit: BPF prog-id=66 op=UNLOAD Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit: BPF prog-id=86 op=LOAD Dec 13 06:22:47.034000 audit: BPF prog-id=46 op=UNLOAD Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.034000 audit: BPF prog-id=87 op=LOAD Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit: BPF prog-id=88 op=LOAD Dec 13 06:22:47.036000 audit: BPF prog-id=47 op=UNLOAD Dec 13 06:22:47.036000 audit: BPF prog-id=48 op=UNLOAD Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.037000 audit: BPF prog-id=89 op=LOAD Dec 13 06:22:47.038000 audit: BPF prog-id=58 op=UNLOAD Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.044000 audit: BPF prog-id=90 op=LOAD Dec 13 06:22:47.045000 audit: BPF prog-id=49 op=UNLOAD Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.049000 audit: BPF prog-id=91 op=LOAD Dec 13 06:22:47.049000 audit: BPF prog-id=62 op=UNLOAD Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.053000 audit: BPF prog-id=92 op=LOAD Dec 13 06:22:47.054000 audit: BPF prog-id=50 op=UNLOAD Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit: BPF prog-id=93 op=LOAD Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.054000 audit: BPF prog-id=94 op=LOAD Dec 13 06:22:47.054000 audit: BPF prog-id=51 op=UNLOAD Dec 13 06:22:47.056000 audit: BPF prog-id=52 op=UNLOAD Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.058000 audit: BPF prog-id=95 op=LOAD Dec 13 06:22:47.058000 audit: BPF prog-id=74 op=UNLOAD Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.060000 audit: BPF prog-id=96 op=LOAD Dec 13 06:22:47.060000 audit: BPF prog-id=70 op=UNLOAD Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.061000 audit: BPF prog-id=97 op=LOAD Dec 13 06:22:47.062000 audit: BPF prog-id=53 op=UNLOAD Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit: BPF prog-id=98 op=LOAD Dec 13 06:22:47.063000 audit: BPF prog-id=54 op=UNLOAD Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit: BPF prog-id=99 op=LOAD Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.064000 audit: BPF prog-id=100 op=LOAD Dec 13 06:22:47.064000 audit: BPF prog-id=55 op=UNLOAD Dec 13 06:22:47.064000 audit: BPF prog-id=56 op=UNLOAD Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit: BPF prog-id=101 op=LOAD Dec 13 06:22:47.066000 audit: BPF prog-id=78 op=UNLOAD Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:47.067000 audit: BPF prog-id=102 op=LOAD Dec 13 06:22:47.067000 audit: BPF prog-id=57 op=UNLOAD Dec 13 06:22:47.084085 systemd[1]: Stopping kubelet.service... Dec 13 06:22:47.103055 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 06:22:47.103471 systemd[1]: Stopped kubelet.service. Dec 13 06:22:47.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:47.103904 systemd[1]: kubelet.service: Consumed 1.317s CPU time. Dec 13 06:22:47.107519 systemd[1]: Starting kubelet.service... Dec 13 06:22:47.952060 systemd[1]: Started kubelet.service. Dec 13 06:22:47.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:48.079718 kubelet[2066]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 06:22:48.080184 kubelet[2066]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 06:22:48.080302 kubelet[2066]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 06:22:48.082319 kubelet[2066]: I1213 06:22:48.081852 2066 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 06:22:48.091243 kubelet[2066]: I1213 06:22:48.091198 2066 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 06:22:48.091365 kubelet[2066]: I1213 06:22:48.091270 2066 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 06:22:48.092941 kubelet[2066]: I1213 06:22:48.092763 2066 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 06:22:48.097482 kubelet[2066]: I1213 06:22:48.097441 2066 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 06:22:48.146121 kubelet[2066]: I1213 06:22:48.146079 2066 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 06:22:48.154663 kubelet[2066]: I1213 06:22:48.154639 2066 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 06:22:48.155862 kubelet[2066]: I1213 06:22:48.155255 2066 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 06:22:48.156168 kubelet[2066]: I1213 06:22:48.156144 2066 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 06:22:48.157076 kubelet[2066]: I1213 06:22:48.157060 2066 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 06:22:48.157176 kubelet[2066]: I1213 06:22:48.157165 2066 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 06:22:48.157327 kubelet[2066]: I1213 06:22:48.157313 2066 state_mem.go:36] "Initialized new in-memory state store" Dec 13 06:22:48.158248 kubelet[2066]: I1213 06:22:48.158234 2066 kubelet.go:396] "Attempting to sync node with API server" Dec 13 06:22:48.158365 kubelet[2066]: I1213 06:22:48.158354 2066 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 06:22:48.159656 kubelet[2066]: I1213 06:22:48.159641 2066 kubelet.go:312] "Adding apiserver pod source" Dec 13 06:22:48.160417 kubelet[2066]: I1213 06:22:48.160403 2066 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 06:22:48.166917 kubelet[2066]: I1213 06:22:48.165522 2066 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 06:22:48.166917 kubelet[2066]: I1213 06:22:48.165951 2066 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 06:22:48.166917 kubelet[2066]: I1213 06:22:48.166565 2066 server.go:1256] "Started kubelet" Dec 13 06:22:48.179309 kubelet[2066]: I1213 06:22:48.179277 2066 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 06:22:48.179447 kubelet[2066]: I1213 06:22:48.179433 2066 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 06:22:48.179556 kubelet[2066]: I1213 06:22:48.179546 2066 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 06:22:48.178000 audit[2066]: AVC avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:48.178000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 06:22:48.178000 audit[2066]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008495c0 a1=c00085c8e8 a2=c000849590 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:48.178000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 06:22:48.178000 audit[2066]: AVC avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:48.178000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 06:22:48.178000 audit[2066]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008474c0 a1=c00085c900 a2=c000849650 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:48.178000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 06:22:48.209120 kubelet[2066]: I1213 06:22:48.207120 2066 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 06:22:48.209821 kubelet[2066]: I1213 06:22:48.209798 2066 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 06:22:48.210334 kubelet[2066]: I1213 06:22:48.210295 2066 server.go:461] "Adding debug handlers to kubelet server" Dec 13 06:22:48.213748 kubelet[2066]: I1213 06:22:48.213717 2066 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 06:22:48.213954 kubelet[2066]: I1213 06:22:48.213938 2066 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 06:22:48.216411 kubelet[2066]: I1213 06:22:48.216385 2066 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 06:22:48.216609 kubelet[2066]: I1213 06:22:48.216551 2066 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 06:22:48.220925 kubelet[2066]: I1213 06:22:48.220904 2066 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 06:22:48.221878 kubelet[2066]: I1213 06:22:48.221866 2066 factory.go:221] Registration of the systemd container factory successfully Dec 13 06:22:48.222060 kubelet[2066]: I1213 06:22:48.222042 2066 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 06:22:48.222689 kubelet[2066]: I1213 06:22:48.222670 2066 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 06:22:48.222780 kubelet[2066]: I1213 06:22:48.222722 2066 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 06:22:48.222780 kubelet[2066]: I1213 06:22:48.222742 2066 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 06:22:48.222844 kubelet[2066]: E1213 06:22:48.222824 2066 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 06:22:48.229033 kubelet[2066]: I1213 06:22:48.229014 2066 factory.go:221] Registration of the containerd container factory successfully Dec 13 06:22:48.289761 kubelet[2066]: I1213 06:22:48.289680 2066 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 06:22:48.289761 kubelet[2066]: I1213 06:22:48.289718 2066 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 06:22:48.289761 kubelet[2066]: I1213 06:22:48.289741 2066 state_mem.go:36] "Initialized new in-memory state store" Dec 13 06:22:48.289998 kubelet[2066]: I1213 06:22:48.289955 2066 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 06:22:48.289998 kubelet[2066]: I1213 06:22:48.289980 2066 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 06:22:48.289998 kubelet[2066]: I1213 06:22:48.289993 2066 policy_none.go:49] "None policy: Start" Dec 13 06:22:48.291215 kubelet[2066]: I1213 06:22:48.290668 2066 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 06:22:48.291215 kubelet[2066]: I1213 06:22:48.290695 2066 state_mem.go:35] "Initializing new in-memory state store" Dec 13 06:22:48.291215 kubelet[2066]: I1213 06:22:48.290946 2066 state_mem.go:75] "Updated machine memory state" Dec 13 06:22:48.300021 kubelet[2066]: I1213 06:22:48.300003 2066 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 06:22:48.299000 audit[2066]: AVC avc: denied { mac_admin } for pid=2066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:22:48.299000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 06:22:48.299000 audit[2066]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00118aba0 a1=c0010d0ee8 a2=c00118ab70 a3=25 items=0 ppid=1 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:22:48.299000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 06:22:48.300632 kubelet[2066]: I1213 06:22:48.300577 2066 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 06:22:48.300906 kubelet[2066]: I1213 06:22:48.300892 2066 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 06:22:48.324200 kubelet[2066]: I1213 06:22:48.323281 2066 topology_manager.go:215] "Topology Admit Handler" podUID="97cc9f5e1e58eb5ee4cad122716a195f" podNamespace="kube-system" podName="kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.324200 kubelet[2066]: I1213 06:22:48.323421 2066 topology_manager.go:215] "Topology Admit Handler" podUID="c1d4d9a8daecbd12a44f2926d9e15619" podNamespace="kube-system" podName="kube-scheduler-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.324200 kubelet[2066]: I1213 06:22:48.323457 2066 topology_manager.go:215] "Topology Admit Handler" podUID="15be9cf7b1139d7e2b218d5b96550407" podNamespace="kube-system" podName="kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.340732 kubelet[2066]: I1213 06:22:48.340106 2066 kubelet_node_status.go:73] "Attempting to register node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.343958 kubelet[2066]: W1213 06:22:48.341063 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 06:22:48.345886 kubelet[2066]: W1213 06:22:48.344614 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 06:22:48.348895 kubelet[2066]: W1213 06:22:48.348128 2066 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 06:22:48.358174 kubelet[2066]: I1213 06:22:48.356824 2066 kubelet_node_status.go:112] "Node was previously registered" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.358174 kubelet[2066]: I1213 06:22:48.356908 2066 kubelet_node_status.go:76] "Successfully registered node" node="srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.518198 kubelet[2066]: I1213 06:22:48.518128 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/15be9cf7b1139d7e2b218d5b96550407-ca-certs\") pod \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" (UID: \"15be9cf7b1139d7e2b218d5b96550407\") " pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.518926 kubelet[2066]: I1213 06:22:48.518894 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-flexvolume-dir\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.519338 kubelet[2066]: I1213 06:22:48.519312 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c1d4d9a8daecbd12a44f2926d9e15619-kubeconfig\") pod \"kube-scheduler-srv-3em3z.gb1.brightbox.com\" (UID: \"c1d4d9a8daecbd12a44f2926d9e15619\") " pod="kube-system/kube-scheduler-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.519827 kubelet[2066]: I1213 06:22:48.519792 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-kubeconfig\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.520217 kubelet[2066]: I1213 06:22:48.520191 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.520596 kubelet[2066]: I1213 06:22:48.520556 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/15be9cf7b1139d7e2b218d5b96550407-k8s-certs\") pod \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" (UID: \"15be9cf7b1139d7e2b218d5b96550407\") " pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.521213 kubelet[2066]: I1213 06:22:48.521186 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/15be9cf7b1139d7e2b218d5b96550407-usr-share-ca-certificates\") pod \"kube-apiserver-srv-3em3z.gb1.brightbox.com\" (UID: \"15be9cf7b1139d7e2b218d5b96550407\") " pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.521670 kubelet[2066]: I1213 06:22:48.521628 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-ca-certs\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:48.521997 kubelet[2066]: I1213 06:22:48.521984 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97cc9f5e1e58eb5ee4cad122716a195f-k8s-certs\") pod \"kube-controller-manager-srv-3em3z.gb1.brightbox.com\" (UID: \"97cc9f5e1e58eb5ee4cad122716a195f\") " pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" Dec 13 06:22:49.172516 kubelet[2066]: I1213 06:22:49.172437 2066 apiserver.go:52] "Watching apiserver" Dec 13 06:22:49.216532 kubelet[2066]: I1213 06:22:49.216505 2066 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 06:22:49.356817 kubelet[2066]: I1213 06:22:49.356780 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-3em3z.gb1.brightbox.com" podStartSLOduration=1.356699245 podStartE2EDuration="1.356699245s" podCreationTimestamp="2024-12-13 06:22:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 06:22:49.32382595 +0000 UTC m=+1.351450584" watchObservedRunningTime="2024-12-13 06:22:49.356699245 +0000 UTC m=+1.384323895" Dec 13 06:22:49.394458 kubelet[2066]: I1213 06:22:49.394421 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-3em3z.gb1.brightbox.com" podStartSLOduration=1.394377924 podStartE2EDuration="1.394377924s" podCreationTimestamp="2024-12-13 06:22:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 06:22:49.357028855 +0000 UTC m=+1.384653512" watchObservedRunningTime="2024-12-13 06:22:49.394377924 +0000 UTC m=+1.422002581" Dec 13 06:22:49.443537 kubelet[2066]: I1213 06:22:49.443357 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-3em3z.gb1.brightbox.com" podStartSLOduration=1.4433056309999999 podStartE2EDuration="1.443305631s" podCreationTimestamp="2024-12-13 06:22:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 06:22:49.39462977 +0000 UTC m=+1.422254427" watchObservedRunningTime="2024-12-13 06:22:49.443305631 +0000 UTC m=+1.470930265" Dec 13 06:22:53.406162 sudo[1380]: pam_unix(sudo:session): session closed for user root Dec 13 06:22:53.409448 kernel: kauditd_printk_skb: 266 callbacks suppressed Dec 13 06:22:53.409610 kernel: audit: type=1106 audit(1734070973.405:800): pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:53.405000 audit[1380]: USER_END pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:53.408000 audit[1380]: CRED_DISP pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:53.416815 kernel: audit: type=1104 audit(1734070973.408:801): pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 06:22:53.562134 sshd[1377]: pam_unix(sshd:session): session closed for user core Dec 13 06:22:53.566000 audit[1377]: USER_END pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:53.567000 audit[1377]: CRED_DISP pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:53.576203 systemd[1]: sshd@8-10.244.95.98:22-139.178.89.65:49246.service: Deactivated successfully. Dec 13 06:22:53.577645 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 06:22:53.578626 systemd[1]: session-9.scope: Consumed 5.922s CPU time. Dec 13 06:22:53.579545 kernel: audit: type=1106 audit(1734070973.566:802): pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:53.579630 kernel: audit: type=1104 audit(1734070973.567:803): pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:22:53.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.98:22-139.178.89.65:49246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:53.583851 systemd-logind[1179]: Session 9 logged out. Waiting for processes to exit. Dec 13 06:22:53.585329 kernel: audit: type=1131 audit(1734070973.575:804): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.95.98:22-139.178.89.65:49246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:22:53.585628 systemd-logind[1179]: Removed session 9. Dec 13 06:22:57.947000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526947 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 06:22:57.955150 kernel: audit: type=1400 audit(1734070977.947:805): avc: denied { watch } for pid=1933 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526947 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 06:22:57.947000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011a83c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:57.959770 kernel: audit: type=1300 audit(1734070977.947:805): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011a83c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:57.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:57.964733 kernel: audit: type=1327 audit(1734070977.947:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.350000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.363111 kernel: audit: type=1400 audit(1734070979.350:806): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.357000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.357000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed7b40 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.372239 kernel: audit: type=1400 audit(1734070979.357:807): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.372297 kernel: audit: type=1300 audit(1734070979.357:807): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed7b40 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.372325 kernel: audit: type=1327 audit(1734070979.357:807): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.357000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.378938 kernel: audit: type=1400 audit(1734070979.357:808): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.379004 kernel: audit: type=1300 audit(1734070979.357:808): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed7bc0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.357000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed7bc0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.383035 kernel: audit: type=1327 audit(1734070979.357:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.358000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.389790 kernel: audit: type=1400 audit(1734070979.358:809): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:22:59.389875 kernel: audit: type=1300 audit(1734070979.358:809): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed7c40 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.358000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed7c40 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.397799 kernel: audit: type=1327 audit(1734070979.358:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.350000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013fd8e0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:22:59.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:22:59.875224 kubelet[2066]: I1213 06:22:59.875178 2066 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 06:22:59.875999 env[1185]: time="2024-12-13T06:22:59.875885095Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 06:22:59.876344 kubelet[2066]: I1213 06:22:59.876311 2066 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 06:23:00.430243 kubelet[2066]: I1213 06:23:00.430201 2066 topology_manager.go:215] "Topology Admit Handler" podUID="ea2d1fd9-12c3-4028-abce-c8c3729de384" podNamespace="kube-system" podName="kube-proxy-z74mx" Dec 13 06:23:00.439515 systemd[1]: Created slice kubepods-besteffort-podea2d1fd9_12c3_4028_abce_c8c3729de384.slice. Dec 13 06:23:00.501881 kubelet[2066]: I1213 06:23:00.501824 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ea2d1fd9-12c3-4028-abce-c8c3729de384-kube-proxy\") pod \"kube-proxy-z74mx\" (UID: \"ea2d1fd9-12c3-4028-abce-c8c3729de384\") " pod="kube-system/kube-proxy-z74mx" Dec 13 06:23:00.502282 kubelet[2066]: I1213 06:23:00.502243 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cwwpg\" (UniqueName: \"kubernetes.io/projected/ea2d1fd9-12c3-4028-abce-c8c3729de384-kube-api-access-cwwpg\") pod \"kube-proxy-z74mx\" (UID: \"ea2d1fd9-12c3-4028-abce-c8c3729de384\") " pod="kube-system/kube-proxy-z74mx" Dec 13 06:23:00.502518 kubelet[2066]: I1213 06:23:00.502494 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ea2d1fd9-12c3-4028-abce-c8c3729de384-lib-modules\") pod \"kube-proxy-z74mx\" (UID: \"ea2d1fd9-12c3-4028-abce-c8c3729de384\") " pod="kube-system/kube-proxy-z74mx" Dec 13 06:23:00.502756 kubelet[2066]: I1213 06:23:00.502734 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ea2d1fd9-12c3-4028-abce-c8c3729de384-xtables-lock\") pod \"kube-proxy-z74mx\" (UID: \"ea2d1fd9-12c3-4028-abce-c8c3729de384\") " pod="kube-system/kube-proxy-z74mx" Dec 13 06:23:00.625962 kubelet[2066]: E1213 06:23:00.625878 2066 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 06:23:00.625962 kubelet[2066]: E1213 06:23:00.625938 2066 projected.go:200] Error preparing data for projected volume kube-api-access-cwwpg for pod kube-system/kube-proxy-z74mx: configmap "kube-root-ca.crt" not found Dec 13 06:23:00.626400 kubelet[2066]: E1213 06:23:00.626068 2066 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ea2d1fd9-12c3-4028-abce-c8c3729de384-kube-api-access-cwwpg podName:ea2d1fd9-12c3-4028-abce-c8c3729de384 nodeName:}" failed. No retries permitted until 2024-12-13 06:23:01.126018576 +0000 UTC m=+13.153643208 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-cwwpg" (UniqueName: "kubernetes.io/projected/ea2d1fd9-12c3-4028-abce-c8c3729de384-kube-api-access-cwwpg") pod "kube-proxy-z74mx" (UID: "ea2d1fd9-12c3-4028-abce-c8c3729de384") : configmap "kube-root-ca.crt" not found Dec 13 06:23:00.917550 kubelet[2066]: I1213 06:23:00.917501 2066 topology_manager.go:215] "Topology Admit Handler" podUID="0bda83bc-93d5-4cbb-a4c5-38551db0eb72" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-gjvgb" Dec 13 06:23:00.924017 systemd[1]: Created slice kubepods-besteffort-pod0bda83bc_93d5_4cbb_a4c5_38551db0eb72.slice. Dec 13 06:23:01.008246 kubelet[2066]: I1213 06:23:01.008174 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2q6f5\" (UniqueName: \"kubernetes.io/projected/0bda83bc-93d5-4cbb-a4c5-38551db0eb72-kube-api-access-2q6f5\") pod \"tigera-operator-c7ccbd65-gjvgb\" (UID: \"0bda83bc-93d5-4cbb-a4c5-38551db0eb72\") " pod="tigera-operator/tigera-operator-c7ccbd65-gjvgb" Dec 13 06:23:01.008775 kubelet[2066]: I1213 06:23:01.008741 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0bda83bc-93d5-4cbb-a4c5-38551db0eb72-var-lib-calico\") pod \"tigera-operator-c7ccbd65-gjvgb\" (UID: \"0bda83bc-93d5-4cbb-a4c5-38551db0eb72\") " pod="tigera-operator/tigera-operator-c7ccbd65-gjvgb" Dec 13 06:23:01.229868 env[1185]: time="2024-12-13T06:23:01.228809463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-gjvgb,Uid:0bda83bc-93d5-4cbb-a4c5-38551db0eb72,Namespace:tigera-operator,Attempt:0,}" Dec 13 06:23:01.248918 env[1185]: time="2024-12-13T06:23:01.248834022Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:01.248918 env[1185]: time="2024-12-13T06:23:01.248889003Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:01.249197 env[1185]: time="2024-12-13T06:23:01.248901372Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:01.249406 env[1185]: time="2024-12-13T06:23:01.249376435Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1acf17a5d190e4f9be7a1391360f12f072dbbb610cc4ca7a6fbd6818edb91bb9 pid=2152 runtime=io.containerd.runc.v2 Dec 13 06:23:01.270638 systemd[1]: Started cri-containerd-1acf17a5d190e4f9be7a1391360f12f072dbbb610cc4ca7a6fbd6818edb91bb9.scope. Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.306000 audit: BPF prog-id=103 op=LOAD Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636631376135643139306534663962653761313339313336306631 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636631376135643139306534663962653761313339313336306631 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit: BPF prog-id=104 op=LOAD Dec 13 06:23:01.307000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038cbd0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636631376135643139306534663962653761313339313336306631 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit: BPF prog-id=105 op=LOAD Dec 13 06:23:01.307000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038cc18 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636631376135643139306534663962653761313339313336306631 Dec 13 06:23:01.307000 audit: BPF prog-id=105 op=UNLOAD Dec 13 06:23:01.307000 audit: BPF prog-id=104 op=UNLOAD Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.307000 audit: BPF prog-id=106 op=LOAD Dec 13 06:23:01.307000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038d028 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636631376135643139306534663962653761313339313336306631 Dec 13 06:23:01.349532 env[1185]: time="2024-12-13T06:23:01.349454203Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z74mx,Uid:ea2d1fd9-12c3-4028-abce-c8c3729de384,Namespace:kube-system,Attempt:0,}" Dec 13 06:23:01.362414 env[1185]: time="2024-12-13T06:23:01.362363315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-gjvgb,Uid:0bda83bc-93d5-4cbb-a4c5-38551db0eb72,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"1acf17a5d190e4f9be7a1391360f12f072dbbb610cc4ca7a6fbd6818edb91bb9\"" Dec 13 06:23:01.365960 env[1185]: time="2024-12-13T06:23:01.365922681Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 06:23:01.371529 env[1185]: time="2024-12-13T06:23:01.371465097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:01.371529 env[1185]: time="2024-12-13T06:23:01.371505527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:01.371729 env[1185]: time="2024-12-13T06:23:01.371693098Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:01.371981 env[1185]: time="2024-12-13T06:23:01.371947424Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c22fb8f938c1895a552bef566c11de8a635cbceb5db686436af6478dca657a61 pid=2191 runtime=io.containerd.runc.v2 Dec 13 06:23:01.384415 systemd[1]: Started cri-containerd-c22fb8f938c1895a552bef566c11de8a635cbceb5db686436af6478dca657a61.scope. Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit: BPF prog-id=107 op=LOAD Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332326662386639333863313839356135353262656635363663313164 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332326662386639333863313839356135353262656635363663313164 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit: BPF prog-id=108 op=LOAD Dec 13 06:23:01.400000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000915e0 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332326662386639333863313839356135353262656635363663313164 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.400000 audit: BPF prog-id=109 op=LOAD Dec 13 06:23:01.400000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000091628 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332326662386639333863313839356135353262656635363663313164 Dec 13 06:23:01.400000 audit: BPF prog-id=109 op=UNLOAD Dec 13 06:23:01.401000 audit: BPF prog-id=108 op=UNLOAD Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.401000 audit: BPF prog-id=110 op=LOAD Dec 13 06:23:01.401000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000091a38 items=0 ppid=2191 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332326662386639333863313839356135353262656635363663313164 Dec 13 06:23:01.422839 env[1185]: time="2024-12-13T06:23:01.422786920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z74mx,Uid:ea2d1fd9-12c3-4028-abce-c8c3729de384,Namespace:kube-system,Attempt:0,} returns sandbox id \"c22fb8f938c1895a552bef566c11de8a635cbceb5db686436af6478dca657a61\"" Dec 13 06:23:01.428503 env[1185]: time="2024-12-13T06:23:01.428426984Z" level=info msg="CreateContainer within sandbox \"c22fb8f938c1895a552bef566c11de8a635cbceb5db686436af6478dca657a61\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 06:23:01.446225 env[1185]: time="2024-12-13T06:23:01.446181879Z" level=info msg="CreateContainer within sandbox \"c22fb8f938c1895a552bef566c11de8a635cbceb5db686436af6478dca657a61\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"512c491988340cb9601842a1cfa231b0eaa7c90241f575b4d5e7afae5e779b26\"" Dec 13 06:23:01.447797 env[1185]: time="2024-12-13T06:23:01.447774042Z" level=info msg="StartContainer for \"512c491988340cb9601842a1cfa231b0eaa7c90241f575b4d5e7afae5e779b26\"" Dec 13 06:23:01.472585 systemd[1]: Started cri-containerd-512c491988340cb9601842a1cfa231b0eaa7c90241f575b4d5e7afae5e779b26.scope. Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fb2583ae518 items=0 ppid=2191 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531326334393139383833343063623936303138343261316366613233 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.498000 audit: BPF prog-id=111 op=LOAD Dec 13 06:23:01.498000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000259ba8 items=0 ppid=2191 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531326334393139383833343063623936303138343261316366613233 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit: BPF prog-id=112 op=LOAD Dec 13 06:23:01.499000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000259bf8 items=0 ppid=2191 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531326334393139383833343063623936303138343261316366613233 Dec 13 06:23:01.499000 audit: BPF prog-id=112 op=UNLOAD Dec 13 06:23:01.499000 audit: BPF prog-id=111 op=UNLOAD Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:01.499000 audit: BPF prog-id=113 op=LOAD Dec 13 06:23:01.499000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000259c88 items=0 ppid=2191 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531326334393139383833343063623936303138343261316366613233 Dec 13 06:23:01.514893 env[1185]: time="2024-12-13T06:23:01.514855635Z" level=info msg="StartContainer for \"512c491988340cb9601842a1cfa231b0eaa7c90241f575b4d5e7afae5e779b26\" returns successfully" Dec 13 06:23:01.682000 audit[2284]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.682000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1accd7a0 a2=0 a3=7fff1accd78c items=0 ppid=2243 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 06:23:01.683000 audit[2285]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.683000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcac876250 a2=0 a3=7ffcac87623c items=0 ppid=2243 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 06:23:01.685000 audit[2286]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.685000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff77b31850 a2=0 a3=7fff77b3183c items=0 ppid=2243 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 06:23:01.687000 audit[2287]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.687000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff25d9dfa0 a2=0 a3=7fff25d9df8c items=0 ppid=2243 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 06:23:01.689000 audit[2288]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.689000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9a62e7a0 a2=0 a3=7ffe9a62e78c items=0 ppid=2243 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 06:23:01.693000 audit[2289]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.693000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3d11f940 a2=0 a3=7ffd3d11f92c items=0 ppid=2243 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 06:23:01.795000 audit[2290]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.795000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe90f55190 a2=0 a3=7ffe90f5517c items=0 ppid=2243 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 06:23:01.804000 audit[2292]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.804000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3a2cf010 a2=0 a3=7ffd3a2ceffc items=0 ppid=2243 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 06:23:01.814000 audit[2295]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.814000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc921d5b0 a2=0 a3=7ffdc921d59c items=0 ppid=2243 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 06:23:01.816000 audit[2296]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.816000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee3a14a20 a2=0 a3=7ffee3a14a0c items=0 ppid=2243 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 06:23:01.820000 audit[2298]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.820000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff18160950 a2=0 a3=7fff1816093c items=0 ppid=2243 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 06:23:01.822000 audit[2299]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.822000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6d1cb4a0 a2=0 a3=7ffd6d1cb48c items=0 ppid=2243 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 06:23:01.825000 audit[2301]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.825000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcc476af0 a2=0 a3=7fffcc476adc items=0 ppid=2243 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 06:23:01.830000 audit[2304]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.830000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe159cec50 a2=0 a3=7ffe159cec3c items=0 ppid=2243 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 06:23:01.831000 audit[2305]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.831000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9c30fa40 a2=0 a3=7ffd9c30fa2c items=0 ppid=2243 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 06:23:01.834000 audit[2307]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.834000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff084cedf0 a2=0 a3=7fff084ceddc items=0 ppid=2243 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 06:23:01.835000 audit[2308]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.835000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdde872a90 a2=0 a3=7ffdde872a7c items=0 ppid=2243 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 06:23:01.838000 audit[2310]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.838000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc724b190 a2=0 a3=7ffdc724b17c items=0 ppid=2243 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 06:23:01.842000 audit[2313]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.842000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde2a08500 a2=0 a3=7ffde2a084ec items=0 ppid=2243 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 06:23:01.847000 audit[2316]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.847000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa5826d20 a2=0 a3=7fffa5826d0c items=0 ppid=2243 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 06:23:01.848000 audit[2317]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.848000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff8311030 a2=0 a3=7ffff831101c items=0 ppid=2243 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 06:23:01.851000 audit[2319]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.851000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcb8f94b70 a2=0 a3=7ffcb8f94b5c items=0 ppid=2243 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 06:23:01.855000 audit[2322]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.855000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf6558130 a2=0 a3=7ffdf655811c items=0 ppid=2243 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 06:23:01.856000 audit[2323]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.856000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe41b21990 a2=0 a3=7ffe41b2197c items=0 ppid=2243 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 06:23:01.859000 audit[2325]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 06:23:01.859000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff34a25c60 a2=0 a3=7fff34a25c4c items=0 ppid=2243 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 06:23:01.887000 audit[2331]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:01.887000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc9091b1c0 a2=0 a3=7ffc9091b1ac items=0 ppid=2243 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:01.897000 audit[2331]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:01.897000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc9091b1c0 a2=0 a3=7ffc9091b1ac items=0 ppid=2243 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:01.898000 audit[2338]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.898000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdff1889e0 a2=0 a3=7ffdff1889cc items=0 ppid=2243 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 06:23:01.901000 audit[2340]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.901000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9a17f910 a2=0 a3=7ffc9a17f8fc items=0 ppid=2243 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 06:23:01.905000 audit[2343]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.905000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff848f77a0 a2=0 a3=7fff848f778c items=0 ppid=2243 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 06:23:01.907000 audit[2344]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.907000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe73a6d070 a2=0 a3=7ffe73a6d05c items=0 ppid=2243 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 06:23:01.909000 audit[2346]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.909000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7e2fe6e0 a2=0 a3=7ffe7e2fe6cc items=0 ppid=2243 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 06:23:01.910000 audit[2347]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.910000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde33d00b0 a2=0 a3=7ffde33d009c items=0 ppid=2243 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 06:23:01.913000 audit[2349]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.913000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3fef2970 a2=0 a3=7fff3fef295c items=0 ppid=2243 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 06:23:01.918000 audit[2352]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.918000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff32303970 a2=0 a3=7fff3230395c items=0 ppid=2243 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 06:23:01.920000 audit[2353]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.920000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcceacc5d0 a2=0 a3=7ffcceacc5bc items=0 ppid=2243 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 06:23:01.923000 audit[2355]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.923000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3cacf070 a2=0 a3=7ffd3cacf05c items=0 ppid=2243 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 06:23:01.925000 audit[2356]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.925000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecebc7ce0 a2=0 a3=7ffecebc7ccc items=0 ppid=2243 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 06:23:01.929000 audit[2358]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.929000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa7d95670 a2=0 a3=7fffa7d9565c items=0 ppid=2243 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 06:23:01.934000 audit[2361]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.934000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcbd8eb6c0 a2=0 a3=7ffcbd8eb6ac items=0 ppid=2243 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 06:23:01.938000 audit[2364]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.938000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6b2c2560 a2=0 a3=7ffe6b2c254c items=0 ppid=2243 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 06:23:01.941000 audit[2365]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.941000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd48315f70 a2=0 a3=7ffd48315f5c items=0 ppid=2243 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 06:23:01.944000 audit[2367]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.944000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc8cd001d0 a2=0 a3=7ffc8cd001bc items=0 ppid=2243 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 06:23:01.948000 audit[2370]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.948000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff96978ec0 a2=0 a3=7fff96978eac items=0 ppid=2243 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 06:23:01.949000 audit[2371]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.949000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4eb47e10 a2=0 a3=7fff4eb47dfc items=0 ppid=2243 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 06:23:01.952000 audit[2373]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.952000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff2cd5c1d0 a2=0 a3=7fff2cd5c1bc items=0 ppid=2243 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 06:23:01.953000 audit[2374]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.953000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe95ee80d0 a2=0 a3=7ffe95ee80bc items=0 ppid=2243 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 06:23:01.956000 audit[2376]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.956000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6f203860 a2=0 a3=7ffc6f20384c items=0 ppid=2243 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 06:23:01.961000 audit[2379]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 06:23:01.961000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe40dcbb70 a2=0 a3=7ffe40dcbb5c items=0 ppid=2243 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 06:23:01.964000 audit[2381]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 06:23:01.964000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe9c6d5120 a2=0 a3=7ffe9c6d510c items=0 ppid=2243 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.964000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:01.964000 audit[2381]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 06:23:01.964000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe9c6d5120 a2=0 a3=7ffe9c6d510c items=0 ppid=2243 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:01.964000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:02.139571 systemd[1]: run-containerd-runc-k8s.io-1acf17a5d190e4f9be7a1391360f12f072dbbb610cc4ca7a6fbd6818edb91bb9-runc.IhHf8t.mount: Deactivated successfully. Dec 13 06:23:05.178145 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount384403098.mount: Deactivated successfully. Dec 13 06:23:06.310453 env[1185]: time="2024-12-13T06:23:06.310217223Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:06.314003 env[1185]: time="2024-12-13T06:23:06.313954463Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 06:23:06.322577 env[1185]: time="2024-12-13T06:23:06.322540771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:06.323511 env[1185]: time="2024-12-13T06:23:06.323480607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:06.324601 env[1185]: time="2024-12-13T06:23:06.324569064Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:06.356566 env[1185]: time="2024-12-13T06:23:06.356488184Z" level=info msg="CreateContainer within sandbox \"1acf17a5d190e4f9be7a1391360f12f072dbbb610cc4ca7a6fbd6818edb91bb9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 06:23:06.382050 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2025773657.mount: Deactivated successfully. Dec 13 06:23:06.387524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1779289207.mount: Deactivated successfully. Dec 13 06:23:06.390445 env[1185]: time="2024-12-13T06:23:06.390400011Z" level=info msg="CreateContainer within sandbox \"1acf17a5d190e4f9be7a1391360f12f072dbbb610cc4ca7a6fbd6818edb91bb9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a73077f4716678c4d0c0bd1a84810249f664afaa4da99515d79cee07298ab482\"" Dec 13 06:23:06.391376 env[1185]: time="2024-12-13T06:23:06.391336995Z" level=info msg="StartContainer for \"a73077f4716678c4d0c0bd1a84810249f664afaa4da99515d79cee07298ab482\"" Dec 13 06:23:06.437691 systemd[1]: Started cri-containerd-a73077f4716678c4d0c0bd1a84810249f664afaa4da99515d79cee07298ab482.scope. Dec 13 06:23:06.482887 kernel: kauditd_printk_skb: 312 callbacks suppressed Dec 13 06:23:06.483070 kernel: audit: type=1400 audit(1734070986.464:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.487796 kernel: audit: type=1400 audit(1734070986.464:904): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.487873 kernel: audit: type=1400 audit(1734070986.469:905): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.493341 kernel: audit: type=1400 audit(1734070986.469:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.493413 kernel: audit: type=1400 audit(1734070986.469:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.500730 kernel: audit: type=1400 audit(1734070986.469:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.500799 kernel: audit: type=1400 audit(1734070986.469:909): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.512454 kernel: audit: type=1400 audit(1734070986.469:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.512586 kernel: audit: type=1400 audit(1734070986.469:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.518928 kernel: audit: type=1400 audit(1734070986.470:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.470000 audit: BPF prog-id=114 op=LOAD Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2152 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137333037376634373136363738633464306330626431613834383130 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2152 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137333037376634373136363738633464306330626431613834383130 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.471000 audit: BPF prog-id=115 op=LOAD Dec 13 06:23:06.471000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d0380 items=0 ppid=2152 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137333037376634373136363738633464306330626431613834383130 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit: BPF prog-id=116 op=LOAD Dec 13 06:23:06.482000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d03c8 items=0 ppid=2152 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:06.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137333037376634373136363738633464306330626431613834383130 Dec 13 06:23:06.482000 audit: BPF prog-id=116 op=UNLOAD Dec 13 06:23:06.482000 audit: BPF prog-id=115 op=UNLOAD Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:06.482000 audit: BPF prog-id=117 op=LOAD Dec 13 06:23:06.482000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d07d8 items=0 ppid=2152 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:06.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137333037376634373136363738633464306330626431613834383130 Dec 13 06:23:06.520899 env[1185]: time="2024-12-13T06:23:06.517571475Z" level=info msg="StartContainer for \"a73077f4716678c4d0c0bd1a84810249f664afaa4da99515d79cee07298ab482\" returns successfully" Dec 13 06:23:07.347615 kubelet[2066]: I1213 06:23:07.347576 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-z74mx" podStartSLOduration=7.347463543 podStartE2EDuration="7.347463543s" podCreationTimestamp="2024-12-13 06:23:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 06:23:02.327300159 +0000 UTC m=+14.354924843" watchObservedRunningTime="2024-12-13 06:23:07.347463543 +0000 UTC m=+19.375088194" Dec 13 06:23:08.255129 kubelet[2066]: I1213 06:23:08.255095 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-gjvgb" podStartSLOduration=3.303431458 podStartE2EDuration="8.254278047s" podCreationTimestamp="2024-12-13 06:23:00 +0000 UTC" firstStartedPulling="2024-12-13 06:23:01.363775707 +0000 UTC m=+13.391400341" lastFinishedPulling="2024-12-13 06:23:06.314622298 +0000 UTC m=+18.342246930" observedRunningTime="2024-12-13 06:23:07.348734436 +0000 UTC m=+19.376359086" watchObservedRunningTime="2024-12-13 06:23:08.254278047 +0000 UTC m=+20.281902703" Dec 13 06:23:09.583000 audit[2422]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:09.583000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffcb889ed0 a2=0 a3=7fffcb889ebc items=0 ppid=2243 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:09.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:09.589000 audit[2422]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:09.589000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffcb889ed0 a2=0 a3=0 items=0 ppid=2243 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:09.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:09.610000 audit[2424]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:09.610000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdecd46120 a2=0 a3=7ffdecd4610c items=0 ppid=2243 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:09.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:09.616000 audit[2424]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:09.616000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdecd46120 a2=0 a3=0 items=0 ppid=2243 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:09.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:09.716574 kubelet[2066]: I1213 06:23:09.716521 2066 topology_manager.go:215] "Topology Admit Handler" podUID="87f9a2cf-ef36-4928-8f5d-eac2e528efb1" podNamespace="calico-system" podName="calico-typha-5774dc9d7b-8mrxq" Dec 13 06:23:09.725600 systemd[1]: Created slice kubepods-besteffort-pod87f9a2cf_ef36_4928_8f5d_eac2e528efb1.slice. Dec 13 06:23:09.872662 kubelet[2066]: I1213 06:23:09.872564 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mm729\" (UniqueName: \"kubernetes.io/projected/87f9a2cf-ef36-4928-8f5d-eac2e528efb1-kube-api-access-mm729\") pod \"calico-typha-5774dc9d7b-8mrxq\" (UID: \"87f9a2cf-ef36-4928-8f5d-eac2e528efb1\") " pod="calico-system/calico-typha-5774dc9d7b-8mrxq" Dec 13 06:23:09.872889 kubelet[2066]: I1213 06:23:09.872875 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87f9a2cf-ef36-4928-8f5d-eac2e528efb1-tigera-ca-bundle\") pod \"calico-typha-5774dc9d7b-8mrxq\" (UID: \"87f9a2cf-ef36-4928-8f5d-eac2e528efb1\") " pod="calico-system/calico-typha-5774dc9d7b-8mrxq" Dec 13 06:23:09.872992 kubelet[2066]: I1213 06:23:09.872982 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/87f9a2cf-ef36-4928-8f5d-eac2e528efb1-typha-certs\") pod \"calico-typha-5774dc9d7b-8mrxq\" (UID: \"87f9a2cf-ef36-4928-8f5d-eac2e528efb1\") " pod="calico-system/calico-typha-5774dc9d7b-8mrxq" Dec 13 06:23:09.906723 kubelet[2066]: I1213 06:23:09.906669 2066 topology_manager.go:215] "Topology Admit Handler" podUID="4af643cb-ead4-4529-9a8d-652b3252ac08" podNamespace="calico-system" podName="calico-node-76p4m" Dec 13 06:23:09.911764 systemd[1]: Created slice kubepods-besteffort-pod4af643cb_ead4_4529_9a8d_652b3252ac08.slice. Dec 13 06:23:09.914264 kubelet[2066]: W1213 06:23:09.914236 2066 reflector.go:539] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:srv-3em3z.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3em3z.gb1.brightbox.com' and this object Dec 13 06:23:09.914371 kubelet[2066]: E1213 06:23:09.914297 2066 reflector.go:147] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:srv-3em3z.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3em3z.gb1.brightbox.com' and this object Dec 13 06:23:09.914371 kubelet[2066]: W1213 06:23:09.914236 2066 reflector.go:539] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:srv-3em3z.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3em3z.gb1.brightbox.com' and this object Dec 13 06:23:09.914371 kubelet[2066]: E1213 06:23:09.914316 2066 reflector.go:147] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:srv-3em3z.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-3em3z.gb1.brightbox.com' and this object Dec 13 06:23:10.031528 env[1185]: time="2024-12-13T06:23:10.030066151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5774dc9d7b-8mrxq,Uid:87f9a2cf-ef36-4928-8f5d-eac2e528efb1,Namespace:calico-system,Attempt:0,}" Dec 13 06:23:10.062124 kubelet[2066]: I1213 06:23:10.062065 2066 topology_manager.go:215] "Topology Admit Handler" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" podNamespace="calico-system" podName="csi-node-driver-drh75" Dec 13 06:23:10.062761 kubelet[2066]: E1213 06:23:10.062515 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:10.066273 env[1185]: time="2024-12-13T06:23:10.065961820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:10.066273 env[1185]: time="2024-12-13T06:23:10.066057520Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:10.066273 env[1185]: time="2024-12-13T06:23:10.066070905Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:10.066647 env[1185]: time="2024-12-13T06:23:10.066568967Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/637c070ee24067a0bdf399e3c8e26a73c4c1033e15c2319a453030978f116bfb pid=2435 runtime=io.containerd.runc.v2 Dec 13 06:23:10.074420 kubelet[2066]: I1213 06:23:10.073909 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-xtables-lock\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074420 kubelet[2066]: I1213 06:23:10.073958 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-policysync\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074420 kubelet[2066]: I1213 06:23:10.073992 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-lib-modules\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074420 kubelet[2066]: I1213 06:23:10.074013 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-cni-bin-dir\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074420 kubelet[2066]: I1213 06:23:10.074034 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4af643cb-ead4-4529-9a8d-652b3252ac08-node-certs\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074789 kubelet[2066]: I1213 06:23:10.074078 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-flexvol-driver-host\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074789 kubelet[2066]: I1213 06:23:10.074108 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-var-lib-calico\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074789 kubelet[2066]: I1213 06:23:10.074145 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-cni-log-dir\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074789 kubelet[2066]: I1213 06:23:10.074167 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mlrnm\" (UniqueName: \"kubernetes.io/projected/4af643cb-ead4-4529-9a8d-652b3252ac08-kube-api-access-mlrnm\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074789 kubelet[2066]: I1213 06:23:10.074195 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-cni-net-dir\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074951 kubelet[2066]: I1213 06:23:10.074217 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4af643cb-ead4-4529-9a8d-652b3252ac08-var-run-calico\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.074951 kubelet[2066]: I1213 06:23:10.074255 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4af643cb-ead4-4529-9a8d-652b3252ac08-tigera-ca-bundle\") pod \"calico-node-76p4m\" (UID: \"4af643cb-ead4-4529-9a8d-652b3252ac08\") " pod="calico-system/calico-node-76p4m" Dec 13 06:23:10.111943 systemd[1]: Started cri-containerd-637c070ee24067a0bdf399e3c8e26a73c4c1033e15c2319a453030978f116bfb.scope. Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.133000 audit: BPF prog-id=118 op=LOAD Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2435 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633376330373065653234303637613062646633393965336338653236 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2435 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633376330373065653234303637613062646633393965336338653236 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit: BPF prog-id=119 op=LOAD Dec 13 06:23:10.135000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002192b0 items=0 ppid=2435 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633376330373065653234303637613062646633393965336338653236 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit: BPF prog-id=120 op=LOAD Dec 13 06:23:10.135000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002192f8 items=0 ppid=2435 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633376330373065653234303637613062646633393965336338653236 Dec 13 06:23:10.135000 audit: BPF prog-id=120 op=UNLOAD Dec 13 06:23:10.135000 audit: BPF prog-id=119 op=UNLOAD Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:10.135000 audit: BPF prog-id=121 op=LOAD Dec 13 06:23:10.135000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219708 items=0 ppid=2435 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633376330373065653234303637613062646633393965336338653236 Dec 13 06:23:10.175954 kubelet[2066]: I1213 06:23:10.174841 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0a2d5a25-886a-4c35-a2cc-9586bc77694e-kubelet-dir\") pod \"csi-node-driver-drh75\" (UID: \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\") " pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:10.175954 kubelet[2066]: I1213 06:23:10.174936 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0a2d5a25-886a-4c35-a2cc-9586bc77694e-socket-dir\") pod \"csi-node-driver-drh75\" (UID: \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\") " pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:10.175954 kubelet[2066]: I1213 06:23:10.174965 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0a2d5a25-886a-4c35-a2cc-9586bc77694e-registration-dir\") pod \"csi-node-driver-drh75\" (UID: \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\") " pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:10.175954 kubelet[2066]: I1213 06:23:10.174991 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ks97g\" (UniqueName: \"kubernetes.io/projected/0a2d5a25-886a-4c35-a2cc-9586bc77694e-kube-api-access-ks97g\") pod \"csi-node-driver-drh75\" (UID: \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\") " pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:10.175954 kubelet[2066]: I1213 06:23:10.175091 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0a2d5a25-886a-4c35-a2cc-9586bc77694e-varrun\") pod \"csi-node-driver-drh75\" (UID: \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\") " pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:10.184012 kubelet[2066]: E1213 06:23:10.183965 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.184529 kubelet[2066]: W1213 06:23:10.184476 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.184684 kubelet[2066]: E1213 06:23:10.184668 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.206248 kubelet[2066]: E1213 06:23:10.204325 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.206248 kubelet[2066]: W1213 06:23:10.204343 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.206248 kubelet[2066]: E1213 06:23:10.204365 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.212483 env[1185]: time="2024-12-13T06:23:10.212421110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5774dc9d7b-8mrxq,Uid:87f9a2cf-ef36-4928-8f5d-eac2e528efb1,Namespace:calico-system,Attempt:0,} returns sandbox id \"637c070ee24067a0bdf399e3c8e26a73c4c1033e15c2319a453030978f116bfb\"" Dec 13 06:23:10.214504 env[1185]: time="2024-12-13T06:23:10.214468545Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 06:23:10.276404 kubelet[2066]: E1213 06:23:10.276355 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.276404 kubelet[2066]: W1213 06:23:10.276383 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.276404 kubelet[2066]: E1213 06:23:10.276407 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.277565 kubelet[2066]: E1213 06:23:10.277511 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.277565 kubelet[2066]: W1213 06:23:10.277529 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.277565 kubelet[2066]: E1213 06:23:10.277559 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.278910 kubelet[2066]: E1213 06:23:10.278876 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.279189 kubelet[2066]: W1213 06:23:10.279157 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.279441 kubelet[2066]: E1213 06:23:10.279417 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.279755 kubelet[2066]: E1213 06:23:10.279677 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.279755 kubelet[2066]: W1213 06:23:10.279694 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.279755 kubelet[2066]: E1213 06:23:10.279750 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.280065 kubelet[2066]: E1213 06:23:10.279903 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.280065 kubelet[2066]: W1213 06:23:10.279909 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.280065 kubelet[2066]: E1213 06:23:10.279920 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.280899 kubelet[2066]: E1213 06:23:10.280867 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.280899 kubelet[2066]: W1213 06:23:10.280882 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281165 kubelet[2066]: E1213 06:23:10.281079 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.281165 kubelet[2066]: W1213 06:23:10.281085 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281389 kubelet[2066]: E1213 06:23:10.281204 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.281389 kubelet[2066]: W1213 06:23:10.281209 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281389 kubelet[2066]: E1213 06:23:10.281319 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.281389 kubelet[2066]: W1213 06:23:10.281325 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281389 kubelet[2066]: E1213 06:23:10.281335 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281463 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.281877 kubelet[2066]: W1213 06:23:10.281469 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281478 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281593 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.281877 kubelet[2066]: W1213 06:23:10.281599 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281608 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281762 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.281877 kubelet[2066]: W1213 06:23:10.281768 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281777 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.281877 kubelet[2066]: E1213 06:23:10.281802 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.281952 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.282601 kubelet[2066]: W1213 06:23:10.281957 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.281966 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.281979 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.282110 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.282601 kubelet[2066]: W1213 06:23:10.282115 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.282126 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.282235 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.282601 kubelet[2066]: W1213 06:23:10.282240 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.282601 kubelet[2066]: E1213 06:23:10.282247 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282373 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.283357 kubelet[2066]: W1213 06:23:10.282379 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282388 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282573 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282766 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.283357 kubelet[2066]: W1213 06:23:10.282774 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282783 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282914 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.283357 kubelet[2066]: W1213 06:23:10.282919 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.283357 kubelet[2066]: E1213 06:23:10.282928 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.283074 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284129 kubelet[2066]: W1213 06:23:10.283081 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.283091 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.283213 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284129 kubelet[2066]: W1213 06:23:10.283219 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.283227 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.283333 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284129 kubelet[2066]: W1213 06:23:10.283338 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.283346 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284129 kubelet[2066]: E1213 06:23:10.284062 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284865 kubelet[2066]: W1213 06:23:10.284071 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.284865 kubelet[2066]: E1213 06:23:10.284087 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284865 kubelet[2066]: E1213 06:23:10.284316 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284865 kubelet[2066]: W1213 06:23:10.284323 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.284865 kubelet[2066]: E1213 06:23:10.284333 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284865 kubelet[2066]: E1213 06:23:10.284463 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284865 kubelet[2066]: W1213 06:23:10.284469 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.284865 kubelet[2066]: E1213 06:23:10.284478 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.284865 kubelet[2066]: E1213 06:23:10.284599 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.284865 kubelet[2066]: W1213 06:23:10.284605 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.285608 kubelet[2066]: E1213 06:23:10.284614 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.285608 kubelet[2066]: E1213 06:23:10.284808 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.285608 kubelet[2066]: W1213 06:23:10.284815 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.285608 kubelet[2066]: E1213 06:23:10.284825 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.295450 kubelet[2066]: E1213 06:23:10.295418 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.295450 kubelet[2066]: W1213 06:23:10.295438 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.295450 kubelet[2066]: E1213 06:23:10.295454 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.385504 kubelet[2066]: E1213 06:23:10.385326 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.385504 kubelet[2066]: W1213 06:23:10.385377 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.385504 kubelet[2066]: E1213 06:23:10.385403 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.486479 kubelet[2066]: E1213 06:23:10.486426 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.486479 kubelet[2066]: W1213 06:23:10.486468 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.486479 kubelet[2066]: E1213 06:23:10.486510 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.587624 kubelet[2066]: E1213 06:23:10.587575 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.587624 kubelet[2066]: W1213 06:23:10.587603 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.587624 kubelet[2066]: E1213 06:23:10.587631 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.634000 audit[2504]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:10.634000 audit[2504]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd563875b0 a2=0 a3=7ffd5638759c items=0 ppid=2243 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:10.641000 audit[2504]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:10.641000 audit[2504]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd563875b0 a2=0 a3=0 items=0 ppid=2243 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:10.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:10.689351 kubelet[2066]: E1213 06:23:10.689241 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.689351 kubelet[2066]: W1213 06:23:10.689288 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.689351 kubelet[2066]: E1213 06:23:10.689354 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.800268 kubelet[2066]: E1213 06:23:10.800020 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.802173 kubelet[2066]: W1213 06:23:10.800794 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.802173 kubelet[2066]: E1213 06:23:10.800905 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:10.903925 kubelet[2066]: E1213 06:23:10.903655 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:10.904221 kubelet[2066]: W1213 06:23:10.904175 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:10.904376 kubelet[2066]: E1213 06:23:10.904355 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.005870 kubelet[2066]: E1213 06:23:11.005842 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.006070 kubelet[2066]: W1213 06:23:11.006054 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.006158 kubelet[2066]: E1213 06:23:11.006147 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.107411 kubelet[2066]: E1213 06:23:11.107335 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.107411 kubelet[2066]: W1213 06:23:11.107363 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.107411 kubelet[2066]: E1213 06:23:11.107400 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.176338 kubelet[2066]: E1213 06:23:11.176086 2066 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 06:23:11.177060 kubelet[2066]: E1213 06:23:11.177026 2066 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/4af643cb-ead4-4529-9a8d-652b3252ac08-node-certs podName:4af643cb-ead4-4529-9a8d-652b3252ac08 nodeName:}" failed. No retries permitted until 2024-12-13 06:23:11.67695372 +0000 UTC m=+23.704578401 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/4af643cb-ead4-4529-9a8d-652b3252ac08-node-certs") pod "calico-node-76p4m" (UID: "4af643cb-ead4-4529-9a8d-652b3252ac08") : failed to sync secret cache: timed out waiting for the condition Dec 13 06:23:11.209044 kubelet[2066]: E1213 06:23:11.208982 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.209419 kubelet[2066]: W1213 06:23:11.209380 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.209692 kubelet[2066]: E1213 06:23:11.209657 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.311472 kubelet[2066]: E1213 06:23:11.311396 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.311472 kubelet[2066]: W1213 06:23:11.311447 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.311472 kubelet[2066]: E1213 06:23:11.311495 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.412661 kubelet[2066]: E1213 06:23:11.412610 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.413077 kubelet[2066]: W1213 06:23:11.413040 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.413331 kubelet[2066]: E1213 06:23:11.413279 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.514599 kubelet[2066]: E1213 06:23:11.514534 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.514599 kubelet[2066]: W1213 06:23:11.514578 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.515004 kubelet[2066]: E1213 06:23:11.514621 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.615272 kubelet[2066]: E1213 06:23:11.615241 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.615272 kubelet[2066]: W1213 06:23:11.615262 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.615272 kubelet[2066]: E1213 06:23:11.615284 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.716583 kubelet[2066]: E1213 06:23:11.716355 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.716583 kubelet[2066]: W1213 06:23:11.716386 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.716583 kubelet[2066]: E1213 06:23:11.716412 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.717411 kubelet[2066]: E1213 06:23:11.717261 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.717411 kubelet[2066]: W1213 06:23:11.717274 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.717411 kubelet[2066]: E1213 06:23:11.717290 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.717730 kubelet[2066]: E1213 06:23:11.717604 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.717730 kubelet[2066]: W1213 06:23:11.717615 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.717730 kubelet[2066]: E1213 06:23:11.717627 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.718059 kubelet[2066]: E1213 06:23:11.717914 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.718059 kubelet[2066]: W1213 06:23:11.717924 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.718059 kubelet[2066]: E1213 06:23:11.717936 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.718571 kubelet[2066]: E1213 06:23:11.718240 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.718571 kubelet[2066]: W1213 06:23:11.718249 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.718571 kubelet[2066]: E1213 06:23:11.718260 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:11.725688 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount203540373.mount: Deactivated successfully. Dec 13 06:23:11.735767 kubelet[2066]: E1213 06:23:11.735688 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:11.735767 kubelet[2066]: W1213 06:23:11.735702 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:11.735767 kubelet[2066]: E1213 06:23:11.735728 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:12.020136 env[1185]: time="2024-12-13T06:23:12.020024179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-76p4m,Uid:4af643cb-ead4-4529-9a8d-652b3252ac08,Namespace:calico-system,Attempt:0,}" Dec 13 06:23:12.038738 env[1185]: time="2024-12-13T06:23:12.038558727Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:12.044426 env[1185]: time="2024-12-13T06:23:12.039633469Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:12.044426 env[1185]: time="2024-12-13T06:23:12.039655127Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:12.044426 env[1185]: time="2024-12-13T06:23:12.043807286Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61 pid=2531 runtime=io.containerd.runc.v2 Dec 13 06:23:12.077279 systemd[1]: run-containerd-runc-k8s.io-d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61-runc.fTQfSg.mount: Deactivated successfully. Dec 13 06:23:12.084679 systemd[1]: Started cri-containerd-d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61.scope. Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.121187 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 06:23:12.121292 kernel: audit: type=1400 audit(1734070992.117:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.129229 kernel: audit: type=1400 audit(1734070992.117:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.129305 kernel: audit: type=1400 audit(1734070992.117:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.129335 kernel: audit: type=1400 audit(1734070992.117:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.132033 kernel: audit: type=1400 audit(1734070992.117:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.140924 kernel: audit: type=1400 audit(1734070992.117:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.144870 kernel: audit: type=1400 audit(1734070992.117:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.148734 kernel: audit: type=1400 audit(1734070992.117:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.153784 kernel: audit: type=1400 audit(1734070992.117:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.157077 kernel: audit: type=1400 audit(1734070992.118:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.118000 audit: BPF prog-id=122 op=LOAD Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2531 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433373430346335343030616365643033393834346130366162383937 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2531 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433373430346335343030616365643033393834346130366162383937 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.120000 audit: BPF prog-id=123 op=LOAD Dec 13 06:23:12.120000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032dd10 items=0 ppid=2531 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433373430346335343030616365643033393834346130366162383937 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.122000 audit: BPF prog-id=124 op=LOAD Dec 13 06:23:12.122000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032dd58 items=0 ppid=2531 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:12.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433373430346335343030616365643033393834346130366162383937 Dec 13 06:23:12.133000 audit: BPF prog-id=124 op=UNLOAD Dec 13 06:23:12.133000 audit: BPF prog-id=123 op=UNLOAD Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:12.133000 audit: BPF prog-id=125 op=LOAD Dec 13 06:23:12.133000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000406168 items=0 ppid=2531 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:12.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433373430346335343030616365643033393834346130366162383937 Dec 13 06:23:12.161567 env[1185]: time="2024-12-13T06:23:12.161516389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-76p4m,Uid:4af643cb-ead4-4529-9a8d-652b3252ac08,Namespace:calico-system,Attempt:0,} returns sandbox id \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\"" Dec 13 06:23:12.231609 kubelet[2066]: E1213 06:23:12.231562 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:12.999763 env[1185]: time="2024-12-13T06:23:12.999578156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:13.002200 env[1185]: time="2024-12-13T06:23:13.002138393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:13.003065 env[1185]: time="2024-12-13T06:23:13.003028084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:13.005743 env[1185]: time="2024-12-13T06:23:13.005661848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:13.007269 env[1185]: time="2024-12-13T06:23:13.007216104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 06:23:13.010538 env[1185]: time="2024-12-13T06:23:13.010514362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 06:23:13.020375 env[1185]: time="2024-12-13T06:23:13.020340622Z" level=info msg="CreateContainer within sandbox \"637c070ee24067a0bdf399e3c8e26a73c4c1033e15c2319a453030978f116bfb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 06:23:13.031893 env[1185]: time="2024-12-13T06:23:13.031848123Z" level=info msg="CreateContainer within sandbox \"637c070ee24067a0bdf399e3c8e26a73c4c1033e15c2319a453030978f116bfb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c84623df09948cc29298d29da87530deff8c2a80772e159658bda6b2049b6644\"" Dec 13 06:23:13.032919 env[1185]: time="2024-12-13T06:23:13.032890560Z" level=info msg="StartContainer for \"c84623df09948cc29298d29da87530deff8c2a80772e159658bda6b2049b6644\"" Dec 13 06:23:13.062991 systemd[1]: Started cri-containerd-c84623df09948cc29298d29da87530deff8c2a80772e159658bda6b2049b6644.scope. Dec 13 06:23:13.070537 systemd[1]: run-containerd-runc-k8s.io-c84623df09948cc29298d29da87530deff8c2a80772e159658bda6b2049b6644-runc.rwBogN.mount: Deactivated successfully. Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.090000 audit: BPF prog-id=126 op=LOAD Dec 13 06:23:13.091000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.091000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2435 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:13.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343632336466303939343863633239323938643239646138373533 Dec 13 06:23:13.091000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.091000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2435 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:13.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343632336466303939343863633239323938643239646138373533 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.092000 audit: BPF prog-id=127 op=LOAD Dec 13 06:23:13.092000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e5a10 items=0 ppid=2435 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:13.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343632336466303939343863633239323938643239646138373533 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.093000 audit: BPF prog-id=128 op=LOAD Dec 13 06:23:13.093000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e5a58 items=0 ppid=2435 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:13.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343632336466303939343863633239323938643239646138373533 Dec 13 06:23:13.093000 audit: BPF prog-id=128 op=UNLOAD Dec 13 06:23:13.093000 audit: BPF prog-id=127 op=UNLOAD Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:13.094000 audit: BPF prog-id=129 op=LOAD Dec 13 06:23:13.094000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e5e68 items=0 ppid=2435 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:13.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343632336466303939343863633239323938643239646138373533 Dec 13 06:23:13.133776 env[1185]: time="2024-12-13T06:23:13.130865510Z" level=info msg="StartContainer for \"c84623df09948cc29298d29da87530deff8c2a80772e159658bda6b2049b6644\" returns successfully" Dec 13 06:23:13.423535 kubelet[2066]: E1213 06:23:13.423346 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.424492 kubelet[2066]: W1213 06:23:13.424453 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.424729 kubelet[2066]: E1213 06:23:13.424686 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.425294 kubelet[2066]: E1213 06:23:13.425273 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.425456 kubelet[2066]: W1213 06:23:13.425433 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.425611 kubelet[2066]: E1213 06:23:13.425593 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.426140 kubelet[2066]: E1213 06:23:13.426121 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.426299 kubelet[2066]: W1213 06:23:13.426278 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.426504 kubelet[2066]: E1213 06:23:13.426473 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.426995 kubelet[2066]: E1213 06:23:13.426977 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.427147 kubelet[2066]: W1213 06:23:13.427127 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.427306 kubelet[2066]: E1213 06:23:13.427289 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.427804 kubelet[2066]: E1213 06:23:13.427784 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.427980 kubelet[2066]: W1213 06:23:13.427958 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.428144 kubelet[2066]: E1213 06:23:13.428127 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.428606 kubelet[2066]: E1213 06:23:13.428587 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.428820 kubelet[2066]: W1213 06:23:13.428799 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.428982 kubelet[2066]: E1213 06:23:13.428965 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.429526 kubelet[2066]: E1213 06:23:13.429508 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.429671 kubelet[2066]: W1213 06:23:13.429651 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.429898 kubelet[2066]: E1213 06:23:13.429879 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.430371 kubelet[2066]: E1213 06:23:13.430353 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.430517 kubelet[2066]: W1213 06:23:13.430497 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.430664 kubelet[2066]: E1213 06:23:13.430647 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.431138 kubelet[2066]: E1213 06:23:13.431120 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.431285 kubelet[2066]: W1213 06:23:13.431266 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.431447 kubelet[2066]: E1213 06:23:13.431430 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.431950 kubelet[2066]: E1213 06:23:13.431932 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.432107 kubelet[2066]: W1213 06:23:13.432087 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.432254 kubelet[2066]: E1213 06:23:13.432238 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.432665 kubelet[2066]: E1213 06:23:13.432647 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.432856 kubelet[2066]: W1213 06:23:13.432837 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.433006 kubelet[2066]: E1213 06:23:13.432990 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.433428 kubelet[2066]: E1213 06:23:13.433411 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.433579 kubelet[2066]: W1213 06:23:13.433560 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.433794 kubelet[2066]: E1213 06:23:13.433753 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.434213 kubelet[2066]: E1213 06:23:13.434203 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.434300 kubelet[2066]: W1213 06:23:13.434289 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.434366 kubelet[2066]: E1213 06:23:13.434357 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.434674 kubelet[2066]: E1213 06:23:13.434665 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.434777 kubelet[2066]: W1213 06:23:13.434758 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.434843 kubelet[2066]: E1213 06:23:13.434835 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.435051 kubelet[2066]: E1213 06:23:13.435043 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.435119 kubelet[2066]: W1213 06:23:13.435109 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.435189 kubelet[2066]: E1213 06:23:13.435182 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.435471 kubelet[2066]: E1213 06:23:13.435461 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.435542 kubelet[2066]: W1213 06:23:13.435532 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.435609 kubelet[2066]: E1213 06:23:13.435601 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.435906 kubelet[2066]: E1213 06:23:13.435895 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.435994 kubelet[2066]: W1213 06:23:13.435983 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.436074 kubelet[2066]: E1213 06:23:13.436066 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.436317 kubelet[2066]: E1213 06:23:13.436300 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.436317 kubelet[2066]: W1213 06:23:13.436316 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.436395 kubelet[2066]: E1213 06:23:13.436335 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.436502 kubelet[2066]: E1213 06:23:13.436485 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.436502 kubelet[2066]: W1213 06:23:13.436494 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.436572 kubelet[2066]: E1213 06:23:13.436505 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.436723 kubelet[2066]: E1213 06:23:13.436713 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.436799 kubelet[2066]: W1213 06:23:13.436729 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.436799 kubelet[2066]: E1213 06:23:13.436741 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.437012 kubelet[2066]: E1213 06:23:13.436990 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.437012 kubelet[2066]: W1213 06:23:13.437005 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.437088 kubelet[2066]: E1213 06:23:13.437022 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.437367 kubelet[2066]: E1213 06:23:13.437355 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.437468 kubelet[2066]: W1213 06:23:13.437456 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.437552 kubelet[2066]: E1213 06:23:13.437542 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.437832 kubelet[2066]: E1213 06:23:13.437817 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.437832 kubelet[2066]: W1213 06:23:13.437829 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.437927 kubelet[2066]: E1213 06:23:13.437847 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.438011 kubelet[2066]: E1213 06:23:13.438000 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.438011 kubelet[2066]: W1213 06:23:13.438010 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.438095 kubelet[2066]: E1213 06:23:13.438020 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.438238 kubelet[2066]: E1213 06:23:13.438229 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.438238 kubelet[2066]: W1213 06:23:13.438237 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.438318 kubelet[2066]: E1213 06:23:13.438250 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.438445 kubelet[2066]: E1213 06:23:13.438433 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.438445 kubelet[2066]: W1213 06:23:13.438443 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.438580 kubelet[2066]: E1213 06:23:13.438569 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.438580 kubelet[2066]: W1213 06:23:13.438579 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.438673 kubelet[2066]: E1213 06:23:13.438574 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.438896 kubelet[2066]: E1213 06:23:13.438885 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.439111 kubelet[2066]: E1213 06:23:13.439100 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.439111 kubelet[2066]: W1213 06:23:13.439110 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.439203 kubelet[2066]: E1213 06:23:13.439124 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.439313 kubelet[2066]: E1213 06:23:13.439298 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.439313 kubelet[2066]: W1213 06:23:13.439307 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.439389 kubelet[2066]: E1213 06:23:13.439319 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.439476 kubelet[2066]: E1213 06:23:13.439466 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.439476 kubelet[2066]: W1213 06:23:13.439474 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.439557 kubelet[2066]: E1213 06:23:13.439486 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.439673 kubelet[2066]: E1213 06:23:13.439662 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.439673 kubelet[2066]: W1213 06:23:13.439671 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.439795 kubelet[2066]: E1213 06:23:13.439685 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.440011 kubelet[2066]: E1213 06:23:13.439999 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.440087 kubelet[2066]: W1213 06:23:13.440075 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.440179 kubelet[2066]: E1213 06:23:13.440169 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:13.440369 kubelet[2066]: E1213 06:23:13.440354 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:13.440369 kubelet[2066]: W1213 06:23:13.440369 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:13.440453 kubelet[2066]: E1213 06:23:13.440382 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.226234 kubelet[2066]: E1213 06:23:14.226151 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:14.350282 kubelet[2066]: I1213 06:23:14.350208 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 06:23:14.443913 kubelet[2066]: E1213 06:23:14.443868 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.443913 kubelet[2066]: W1213 06:23:14.443895 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.443913 kubelet[2066]: E1213 06:23:14.443925 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.444556 kubelet[2066]: E1213 06:23:14.444138 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.444556 kubelet[2066]: W1213 06:23:14.444146 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.444556 kubelet[2066]: E1213 06:23:14.444159 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.444841 kubelet[2066]: E1213 06:23:14.444828 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.444841 kubelet[2066]: W1213 06:23:14.444839 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.444949 kubelet[2066]: E1213 06:23:14.444851 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.445171 kubelet[2066]: E1213 06:23:14.445157 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.445171 kubelet[2066]: W1213 06:23:14.445167 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.445293 kubelet[2066]: E1213 06:23:14.445178 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.445407 kubelet[2066]: E1213 06:23:14.445394 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.445407 kubelet[2066]: W1213 06:23:14.445405 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.445509 kubelet[2066]: E1213 06:23:14.445416 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.445727 kubelet[2066]: E1213 06:23:14.445703 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.445727 kubelet[2066]: W1213 06:23:14.445720 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.445843 kubelet[2066]: E1213 06:23:14.445752 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.445946 kubelet[2066]: E1213 06:23:14.445935 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.445946 kubelet[2066]: W1213 06:23:14.445944 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.446069 kubelet[2066]: E1213 06:23:14.445955 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.446256 kubelet[2066]: E1213 06:23:14.446245 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.446256 kubelet[2066]: W1213 06:23:14.446254 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.446371 kubelet[2066]: E1213 06:23:14.446263 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.446469 kubelet[2066]: E1213 06:23:14.446457 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.446469 kubelet[2066]: W1213 06:23:14.446466 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.446578 kubelet[2066]: E1213 06:23:14.446477 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.446799 kubelet[2066]: E1213 06:23:14.446786 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.446799 kubelet[2066]: W1213 06:23:14.446797 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.446906 kubelet[2066]: E1213 06:23:14.446808 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.446991 kubelet[2066]: E1213 06:23:14.446977 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.446991 kubelet[2066]: W1213 06:23:14.446987 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.447094 kubelet[2066]: E1213 06:23:14.447000 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.447281 kubelet[2066]: E1213 06:23:14.447269 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.447281 kubelet[2066]: W1213 06:23:14.447278 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.447388 kubelet[2066]: E1213 06:23:14.447290 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.447493 kubelet[2066]: E1213 06:23:14.447455 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.447493 kubelet[2066]: W1213 06:23:14.447491 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.447679 kubelet[2066]: E1213 06:23:14.447502 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.447679 kubelet[2066]: E1213 06:23:14.447665 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.447679 kubelet[2066]: W1213 06:23:14.447671 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.447679 kubelet[2066]: E1213 06:23:14.447680 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.448281 kubelet[2066]: E1213 06:23:14.447873 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.448281 kubelet[2066]: W1213 06:23:14.447881 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.448281 kubelet[2066]: E1213 06:23:14.447892 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.448650 kubelet[2066]: E1213 06:23:14.448572 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.448740 kubelet[2066]: W1213 06:23:14.448651 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.448740 kubelet[2066]: E1213 06:23:14.448685 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.449002 kubelet[2066]: E1213 06:23:14.448986 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.449002 kubelet[2066]: W1213 06:23:14.448998 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.449124 kubelet[2066]: E1213 06:23:14.449028 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.449287 kubelet[2066]: E1213 06:23:14.449273 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.449287 kubelet[2066]: W1213 06:23:14.449285 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.449377 kubelet[2066]: E1213 06:23:14.449297 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.449547 kubelet[2066]: E1213 06:23:14.449536 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.449547 kubelet[2066]: W1213 06:23:14.449546 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.449638 kubelet[2066]: E1213 06:23:14.449561 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.449779 kubelet[2066]: E1213 06:23:14.449769 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.449779 kubelet[2066]: W1213 06:23:14.449778 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.449865 kubelet[2066]: E1213 06:23:14.449793 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.450050 kubelet[2066]: E1213 06:23:14.450041 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.450050 kubelet[2066]: W1213 06:23:14.450049 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.450179 kubelet[2066]: E1213 06:23:14.450159 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.450282 kubelet[2066]: E1213 06:23:14.450192 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.450351 kubelet[2066]: W1213 06:23:14.450337 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.450428 kubelet[2066]: E1213 06:23:14.450415 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.450730 kubelet[2066]: E1213 06:23:14.450702 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.450819 kubelet[2066]: W1213 06:23:14.450808 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.450920 kubelet[2066]: E1213 06:23:14.450910 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.451129 kubelet[2066]: E1213 06:23:14.451116 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.451129 kubelet[2066]: W1213 06:23:14.451129 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.451215 kubelet[2066]: E1213 06:23:14.451148 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.451556 kubelet[2066]: E1213 06:23:14.451541 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.451653 kubelet[2066]: W1213 06:23:14.451641 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.451807 kubelet[2066]: E1213 06:23:14.451796 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.452043 kubelet[2066]: E1213 06:23:14.452033 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.452121 kubelet[2066]: W1213 06:23:14.452110 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.452189 kubelet[2066]: E1213 06:23:14.452181 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.452430 kubelet[2066]: E1213 06:23:14.452421 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.452503 kubelet[2066]: W1213 06:23:14.452493 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.452585 kubelet[2066]: E1213 06:23:14.452576 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.452828 kubelet[2066]: E1213 06:23:14.452815 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.452828 kubelet[2066]: W1213 06:23:14.452828 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.452920 kubelet[2066]: E1213 06:23:14.452847 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.453096 kubelet[2066]: E1213 06:23:14.453086 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.453096 kubelet[2066]: W1213 06:23:14.453095 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.453180 kubelet[2066]: E1213 06:23:14.453110 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.453384 kubelet[2066]: E1213 06:23:14.453351 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.453384 kubelet[2066]: W1213 06:23:14.453384 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.453459 kubelet[2066]: E1213 06:23:14.453401 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.453821 kubelet[2066]: E1213 06:23:14.453804 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.453876 kubelet[2066]: W1213 06:23:14.453826 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.453965 kubelet[2066]: E1213 06:23:14.453952 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.454049 kubelet[2066]: E1213 06:23:14.454037 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.454049 kubelet[2066]: W1213 06:23:14.454047 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.454153 kubelet[2066]: E1213 06:23:14.454060 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.454604 kubelet[2066]: E1213 06:23:14.454582 2066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 06:23:14.454604 kubelet[2066]: W1213 06:23:14.454594 2066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 06:23:14.454684 kubelet[2066]: E1213 06:23:14.454650 2066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 06:23:14.726397 env[1185]: time="2024-12-13T06:23:14.726313127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:14.728840 env[1185]: time="2024-12-13T06:23:14.728796371Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:14.731130 env[1185]: time="2024-12-13T06:23:14.731096437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:14.734364 env[1185]: time="2024-12-13T06:23:14.734332557Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:14.734927 env[1185]: time="2024-12-13T06:23:14.734894915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 06:23:14.741435 env[1185]: time="2024-12-13T06:23:14.741407700Z" level=info msg="CreateContainer within sandbox \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 06:23:14.752016 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2785735291.mount: Deactivated successfully. Dec 13 06:23:14.762405 env[1185]: time="2024-12-13T06:23:14.762325882Z" level=info msg="CreateContainer within sandbox \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d\"" Dec 13 06:23:14.765921 env[1185]: time="2024-12-13T06:23:14.764847841Z" level=info msg="StartContainer for \"bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d\"" Dec 13 06:23:14.813501 systemd[1]: run-containerd-runc-k8s.io-bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d-runc.WEZA8C.mount: Deactivated successfully. Dec 13 06:23:14.819489 systemd[1]: Started cri-containerd-bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d.scope. Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4d513aa448 items=0 ppid=2531 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:14.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263316530386562363766636332346139373331613735396163396438 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit: BPF prog-id=130 op=LOAD Dec 13 06:23:14.836000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000220f18 items=0 ppid=2531 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:14.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263316530386562363766636332346139373331613735396163396438 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit: BPF prog-id=131 op=LOAD Dec 13 06:23:14.836000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220f68 items=0 ppid=2531 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:14.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263316530386562363766636332346139373331613735396163396438 Dec 13 06:23:14.836000 audit: BPF prog-id=131 op=UNLOAD Dec 13 06:23:14.836000 audit: BPF prog-id=130 op=UNLOAD Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:14.836000 audit: BPF prog-id=132 op=LOAD Dec 13 06:23:14.836000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000220ff8 items=0 ppid=2531 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:14.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263316530386562363766636332346139373331613735396163396438 Dec 13 06:23:14.877917 env[1185]: time="2024-12-13T06:23:14.877862082Z" level=info msg="StartContainer for \"bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d\" returns successfully" Dec 13 06:23:14.898121 systemd[1]: cri-containerd-bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d.scope: Deactivated successfully. Dec 13 06:23:14.902000 audit: BPF prog-id=132 op=UNLOAD Dec 13 06:23:14.963546 env[1185]: time="2024-12-13T06:23:14.963436348Z" level=info msg="shim disconnected" id=bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d Dec 13 06:23:14.964111 env[1185]: time="2024-12-13T06:23:14.964045657Z" level=warning msg="cleaning up after shim disconnected" id=bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d namespace=k8s.io Dec 13 06:23:14.964300 env[1185]: time="2024-12-13T06:23:14.964263433Z" level=info msg="cleaning up dead shim" Dec 13 06:23:14.981731 env[1185]: time="2024-12-13T06:23:14.981561546Z" level=warning msg="cleanup warnings time=\"2024-12-13T06:23:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2716 runtime=io.containerd.runc.v2\n" Dec 13 06:23:15.360114 env[1185]: time="2024-12-13T06:23:15.359952255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 06:23:15.383949 kubelet[2066]: I1213 06:23:15.383901 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5774dc9d7b-8mrxq" podStartSLOduration=3.589614414 podStartE2EDuration="6.383808457s" podCreationTimestamp="2024-12-13 06:23:09 +0000 UTC" firstStartedPulling="2024-12-13 06:23:10.213987687 +0000 UTC m=+22.241612320" lastFinishedPulling="2024-12-13 06:23:13.008181674 +0000 UTC m=+25.035806363" observedRunningTime="2024-12-13 06:23:13.368202635 +0000 UTC m=+25.395827292" watchObservedRunningTime="2024-12-13 06:23:15.383808457 +0000 UTC m=+27.411433359" Dec 13 06:23:15.753004 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bc1e08eb67fcc24a9731a759ac9d8690f61416253bedb6b7e2a12c4c771dc34d-rootfs.mount: Deactivated successfully. Dec 13 06:23:16.224065 kubelet[2066]: E1213 06:23:16.224001 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:18.225257 kubelet[2066]: E1213 06:23:18.224968 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:20.225454 kubelet[2066]: E1213 06:23:20.223732 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:22.225517 kubelet[2066]: E1213 06:23:22.225368 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:23.439775 env[1185]: time="2024-12-13T06:23:23.439530866Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:23.442130 env[1185]: time="2024-12-13T06:23:23.442081055Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 06:23:23.442787 env[1185]: time="2024-12-13T06:23:23.442701524Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:23.443233 env[1185]: time="2024-12-13T06:23:23.443207985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:23.443740 env[1185]: time="2024-12-13T06:23:23.443700635Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:23.457458 env[1185]: time="2024-12-13T06:23:23.456128351Z" level=info msg="CreateContainer within sandbox \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 06:23:23.473158 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4086258286.mount: Deactivated successfully. Dec 13 06:23:23.478992 env[1185]: time="2024-12-13T06:23:23.478945932Z" level=info msg="CreateContainer within sandbox \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e\"" Dec 13 06:23:23.479751 env[1185]: time="2024-12-13T06:23:23.479726615Z" level=info msg="StartContainer for \"64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e\"" Dec 13 06:23:23.517276 systemd[1]: run-containerd-runc-k8s.io-64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e-runc.WQXUd1.mount: Deactivated successfully. Dec 13 06:23:23.531530 systemd[1]: Started cri-containerd-64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e.scope. Dec 13 06:23:23.560528 kernel: kauditd_printk_skb: 148 callbacks suppressed Dec 13 06:23:23.561928 kernel: audit: type=1400 audit(1734071003.551:988): avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.561983 kernel: audit: type=1300 audit(1734071003.551:988): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f2dac21c718 items=0 ppid=2531 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f2dac21c718 items=0 ppid=2531 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:23.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663636326262326139346630626439363939326533306462643439 Dec 13 06:23:23.571355 kernel: audit: type=1327 audit(1734071003.551:988): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663636326262326139346630626439363939326533306462643439 Dec 13 06:23:23.571454 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.573954 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.574036 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.579777 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.579842 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.585105 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.585179 kernel: audit: type=1400 audit(1734071003.551:989): avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.551000 audit: BPF prog-id=133 op=LOAD Dec 13 06:23:23.551000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00028a3c8 items=0 ppid=2531 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:23.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663636326262326139346630626439363939326533306462643439 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.554000 audit: BPF prog-id=134 op=LOAD Dec 13 06:23:23.554000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00028a418 items=0 ppid=2531 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:23.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663636326262326139346630626439363939326533306462643439 Dec 13 06:23:23.557000 audit: BPF prog-id=134 op=UNLOAD Dec 13 06:23:23.557000 audit: BPF prog-id=133 op=UNLOAD Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:23.557000 audit: BPF prog-id=135 op=LOAD Dec 13 06:23:23.557000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00028a4a8 items=0 ppid=2531 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:23.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663636326262326139346630626439363939326533306462643439 Dec 13 06:23:23.594417 env[1185]: time="2024-12-13T06:23:23.594357947Z" level=info msg="StartContainer for \"64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e\" returns successfully" Dec 13 06:23:24.232693 kubelet[2066]: E1213 06:23:24.232658 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:24.246618 systemd[1]: cri-containerd-64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e.scope: Deactivated successfully. Dec 13 06:23:24.248000 audit: BPF prog-id=135 op=UNLOAD Dec 13 06:23:24.262464 kubelet[2066]: I1213 06:23:24.262442 2066 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 06:23:24.295842 env[1185]: time="2024-12-13T06:23:24.295789553Z" level=info msg="shim disconnected" id=64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e Dec 13 06:23:24.295842 env[1185]: time="2024-12-13T06:23:24.295842615Z" level=warning msg="cleaning up after shim disconnected" id=64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e namespace=k8s.io Dec 13 06:23:24.296143 env[1185]: time="2024-12-13T06:23:24.295853244Z" level=info msg="cleaning up dead shim" Dec 13 06:23:24.306062 env[1185]: time="2024-12-13T06:23:24.306001425Z" level=warning msg="cleanup warnings time=\"2024-12-13T06:23:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2782 runtime=io.containerd.runc.v2\n" Dec 13 06:23:24.319949 kubelet[2066]: I1213 06:23:24.319896 2066 topology_manager.go:215] "Topology Admit Handler" podUID="ed610c70-ccfa-458e-b18e-b7a2f0ecd55c" podNamespace="kube-system" podName="coredns-76f75df574-vb29h" Dec 13 06:23:24.321632 kubelet[2066]: I1213 06:23:24.321242 2066 topology_manager.go:215] "Topology Admit Handler" podUID="76237571-200e-49e8-8fb8-8cf5bae35e01" podNamespace="calico-system" podName="calico-kube-controllers-86bd75c99-q5h75" Dec 13 06:23:24.324283 kubelet[2066]: I1213 06:23:24.324260 2066 topology_manager.go:215] "Topology Admit Handler" podUID="cebca8c8-2276-4431-ac1a-60136909835c" podNamespace="kube-system" podName="coredns-76f75df574-htghs" Dec 13 06:23:24.330655 systemd[1]: Created slice kubepods-burstable-poded610c70_ccfa_458e_b18e_b7a2f0ecd55c.slice. Dec 13 06:23:24.337791 systemd[1]: Created slice kubepods-besteffort-pod76237571_200e_49e8_8fb8_8cf5bae35e01.slice. Dec 13 06:23:24.342771 kubelet[2066]: I1213 06:23:24.341890 2066 topology_manager.go:215] "Topology Admit Handler" podUID="f7e65410-005f-4da2-975b-33dd208722a6" podNamespace="calico-apiserver" podName="calico-apiserver-75fd9c9ddf-29r6m" Dec 13 06:23:24.342771 kubelet[2066]: I1213 06:23:24.342071 2066 topology_manager.go:215] "Topology Admit Handler" podUID="2566e160-4771-4e18-b20b-c749e8b20e8a" podNamespace="calico-apiserver" podName="calico-apiserver-75fd9c9ddf-dcngk" Dec 13 06:23:24.342611 systemd[1]: Created slice kubepods-burstable-podcebca8c8_2276_4431_ac1a_60136909835c.slice. Dec 13 06:23:24.352922 systemd[1]: Created slice kubepods-besteffort-pod2566e160_4771_4e18_b20b_c749e8b20e8a.slice. Dec 13 06:23:24.357830 systemd[1]: Created slice kubepods-besteffort-podf7e65410_005f_4da2_975b_33dd208722a6.slice. Dec 13 06:23:24.385922 env[1185]: time="2024-12-13T06:23:24.385885673Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 06:23:24.428180 kubelet[2066]: I1213 06:23:24.428151 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f7e65410-005f-4da2-975b-33dd208722a6-calico-apiserver-certs\") pod \"calico-apiserver-75fd9c9ddf-29r6m\" (UID: \"f7e65410-005f-4da2-975b-33dd208722a6\") " pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" Dec 13 06:23:24.428544 kubelet[2066]: I1213 06:23:24.428532 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kp7xd\" (UniqueName: \"kubernetes.io/projected/76237571-200e-49e8-8fb8-8cf5bae35e01-kube-api-access-kp7xd\") pod \"calico-kube-controllers-86bd75c99-q5h75\" (UID: \"76237571-200e-49e8-8fb8-8cf5bae35e01\") " pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" Dec 13 06:23:24.429025 kubelet[2066]: I1213 06:23:24.429009 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ed610c70-ccfa-458e-b18e-b7a2f0ecd55c-config-volume\") pod \"coredns-76f75df574-vb29h\" (UID: \"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c\") " pod="kube-system/coredns-76f75df574-vb29h" Dec 13 06:23:24.429171 kubelet[2066]: I1213 06:23:24.429161 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cebca8c8-2276-4431-ac1a-60136909835c-config-volume\") pod \"coredns-76f75df574-htghs\" (UID: \"cebca8c8-2276-4431-ac1a-60136909835c\") " pod="kube-system/coredns-76f75df574-htghs" Dec 13 06:23:24.430721 kubelet[2066]: I1213 06:23:24.430692 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zfxl7\" (UniqueName: \"kubernetes.io/projected/f7e65410-005f-4da2-975b-33dd208722a6-kube-api-access-zfxl7\") pod \"calico-apiserver-75fd9c9ddf-29r6m\" (UID: \"f7e65410-005f-4da2-975b-33dd208722a6\") " pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" Dec 13 06:23:24.430881 kubelet[2066]: I1213 06:23:24.430870 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2566e160-4771-4e18-b20b-c749e8b20e8a-calico-apiserver-certs\") pod \"calico-apiserver-75fd9c9ddf-dcngk\" (UID: \"2566e160-4771-4e18-b20b-c749e8b20e8a\") " pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" Dec 13 06:23:24.430988 kubelet[2066]: I1213 06:23:24.430978 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tz7t5\" (UniqueName: \"kubernetes.io/projected/cebca8c8-2276-4431-ac1a-60136909835c-kube-api-access-tz7t5\") pod \"coredns-76f75df574-htghs\" (UID: \"cebca8c8-2276-4431-ac1a-60136909835c\") " pod="kube-system/coredns-76f75df574-htghs" Dec 13 06:23:24.431350 kubelet[2066]: I1213 06:23:24.431116 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t59t7\" (UniqueName: \"kubernetes.io/projected/2566e160-4771-4e18-b20b-c749e8b20e8a-kube-api-access-t59t7\") pod \"calico-apiserver-75fd9c9ddf-dcngk\" (UID: \"2566e160-4771-4e18-b20b-c749e8b20e8a\") " pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" Dec 13 06:23:24.431350 kubelet[2066]: I1213 06:23:24.431182 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/76237571-200e-49e8-8fb8-8cf5bae35e01-tigera-ca-bundle\") pod \"calico-kube-controllers-86bd75c99-q5h75\" (UID: \"76237571-200e-49e8-8fb8-8cf5bae35e01\") " pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" Dec 13 06:23:24.431350 kubelet[2066]: I1213 06:23:24.431213 2066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x54jf\" (UniqueName: \"kubernetes.io/projected/ed610c70-ccfa-458e-b18e-b7a2f0ecd55c-kube-api-access-x54jf\") pod \"coredns-76f75df574-vb29h\" (UID: \"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c\") " pod="kube-system/coredns-76f75df574-vb29h" Dec 13 06:23:24.469400 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-64f662bb2a94f0bd96992e30dbd4970c1846ba86a6c173cbad61dcdb43d0a27e-rootfs.mount: Deactivated successfully. Dec 13 06:23:24.637652 env[1185]: time="2024-12-13T06:23:24.635442762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vb29h,Uid:ed610c70-ccfa-458e-b18e-b7a2f0ecd55c,Namespace:kube-system,Attempt:0,}" Dec 13 06:23:24.640898 env[1185]: time="2024-12-13T06:23:24.640843065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bd75c99-q5h75,Uid:76237571-200e-49e8-8fb8-8cf5bae35e01,Namespace:calico-system,Attempt:0,}" Dec 13 06:23:24.650181 env[1185]: time="2024-12-13T06:23:24.650141667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-htghs,Uid:cebca8c8-2276-4431-ac1a-60136909835c,Namespace:kube-system,Attempt:0,}" Dec 13 06:23:24.660724 env[1185]: time="2024-12-13T06:23:24.660672157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-dcngk,Uid:2566e160-4771-4e18-b20b-c749e8b20e8a,Namespace:calico-apiserver,Attempt:0,}" Dec 13 06:23:24.664002 env[1185]: time="2024-12-13T06:23:24.661636220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-29r6m,Uid:f7e65410-005f-4da2-975b-33dd208722a6,Namespace:calico-apiserver,Attempt:0,}" Dec 13 06:23:24.806398 env[1185]: time="2024-12-13T06:23:24.806297001Z" level=error msg="Failed to destroy network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.806759 env[1185]: time="2024-12-13T06:23:24.806729178Z" level=error msg="encountered an error cleaning up failed sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.806808 env[1185]: time="2024-12-13T06:23:24.806782413Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-29r6m,Uid:f7e65410-005f-4da2-975b-33dd208722a6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.807571 kubelet[2066]: E1213 06:23:24.807150 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.807571 kubelet[2066]: E1213 06:23:24.807233 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" Dec 13 06:23:24.807571 kubelet[2066]: E1213 06:23:24.807260 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" Dec 13 06:23:24.807799 kubelet[2066]: E1213 06:23:24.807321 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75fd9c9ddf-29r6m_calico-apiserver(f7e65410-005f-4da2-975b-33dd208722a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75fd9c9ddf-29r6m_calico-apiserver(f7e65410-005f-4da2-975b-33dd208722a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" podUID="f7e65410-005f-4da2-975b-33dd208722a6" Dec 13 06:23:24.842026 env[1185]: time="2024-12-13T06:23:24.841966348Z" level=error msg="Failed to destroy network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.842490 env[1185]: time="2024-12-13T06:23:24.842459543Z" level=error msg="encountered an error cleaning up failed sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.842652 env[1185]: time="2024-12-13T06:23:24.842626849Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vb29h,Uid:ed610c70-ccfa-458e-b18e-b7a2f0ecd55c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.843246 kubelet[2066]: E1213 06:23:24.842905 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.843246 kubelet[2066]: E1213 06:23:24.842963 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-vb29h" Dec 13 06:23:24.843246 kubelet[2066]: E1213 06:23:24.842983 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-vb29h" Dec 13 06:23:24.843505 kubelet[2066]: E1213 06:23:24.843034 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-vb29h_kube-system(ed610c70-ccfa-458e-b18e-b7a2f0ecd55c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-vb29h_kube-system(ed610c70-ccfa-458e-b18e-b7a2f0ecd55c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-vb29h" podUID="ed610c70-ccfa-458e-b18e-b7a2f0ecd55c" Dec 13 06:23:24.868170 env[1185]: time="2024-12-13T06:23:24.868114723Z" level=error msg="Failed to destroy network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.868491 env[1185]: time="2024-12-13T06:23:24.868463287Z" level=error msg="encountered an error cleaning up failed sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.868548 env[1185]: time="2024-12-13T06:23:24.868515331Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bd75c99-q5h75,Uid:76237571-200e-49e8-8fb8-8cf5bae35e01,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.869114 kubelet[2066]: E1213 06:23:24.868784 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.869114 kubelet[2066]: E1213 06:23:24.868839 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" Dec 13 06:23:24.869114 kubelet[2066]: E1213 06:23:24.868860 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" Dec 13 06:23:24.869291 kubelet[2066]: E1213 06:23:24.868912 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-86bd75c99-q5h75_calico-system(76237571-200e-49e8-8fb8-8cf5bae35e01)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-86bd75c99-q5h75_calico-system(76237571-200e-49e8-8fb8-8cf5bae35e01)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" podUID="76237571-200e-49e8-8fb8-8cf5bae35e01" Dec 13 06:23:24.876935 env[1185]: time="2024-12-13T06:23:24.876893939Z" level=error msg="Failed to destroy network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.877419 env[1185]: time="2024-12-13T06:23:24.877388778Z" level=error msg="encountered an error cleaning up failed sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.877580 env[1185]: time="2024-12-13T06:23:24.877554284Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-htghs,Uid:cebca8c8-2276-4431-ac1a-60136909835c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.878098 kubelet[2066]: E1213 06:23:24.877824 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.878098 kubelet[2066]: E1213 06:23:24.877866 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-htghs" Dec 13 06:23:24.878098 kubelet[2066]: E1213 06:23:24.877888 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-htghs" Dec 13 06:23:24.878252 kubelet[2066]: E1213 06:23:24.877934 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-htghs_kube-system(cebca8c8-2276-4431-ac1a-60136909835c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-htghs_kube-system(cebca8c8-2276-4431-ac1a-60136909835c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-htghs" podUID="cebca8c8-2276-4431-ac1a-60136909835c" Dec 13 06:23:24.886180 env[1185]: time="2024-12-13T06:23:24.886143681Z" level=error msg="Failed to destroy network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.886693 env[1185]: time="2024-12-13T06:23:24.886663801Z" level=error msg="encountered an error cleaning up failed sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.886834 env[1185]: time="2024-12-13T06:23:24.886807922Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-dcngk,Uid:2566e160-4771-4e18-b20b-c749e8b20e8a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.887498 kubelet[2066]: E1213 06:23:24.887150 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:24.887498 kubelet[2066]: E1213 06:23:24.887203 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" Dec 13 06:23:24.887498 kubelet[2066]: E1213 06:23:24.887225 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" Dec 13 06:23:24.889291 kubelet[2066]: E1213 06:23:24.887290 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75fd9c9ddf-dcngk_calico-apiserver(2566e160-4771-4e18-b20b-c749e8b20e8a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75fd9c9ddf-dcngk_calico-apiserver(2566e160-4771-4e18-b20b-c749e8b20e8a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" podUID="2566e160-4771-4e18-b20b-c749e8b20e8a" Dec 13 06:23:25.390938 kubelet[2066]: I1213 06:23:25.390884 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:25.394350 env[1185]: time="2024-12-13T06:23:25.392809992Z" level=info msg="StopPodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\"" Dec 13 06:23:25.394999 kubelet[2066]: I1213 06:23:25.394968 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:25.395730 env[1185]: time="2024-12-13T06:23:25.395671432Z" level=info msg="StopPodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\"" Dec 13 06:23:25.409637 kubelet[2066]: I1213 06:23:25.409591 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:25.414076 env[1185]: time="2024-12-13T06:23:25.412064413Z" level=info msg="StopPodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\"" Dec 13 06:23:25.415995 kubelet[2066]: I1213 06:23:25.415971 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:25.416635 env[1185]: time="2024-12-13T06:23:25.416588262Z" level=info msg="StopPodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\"" Dec 13 06:23:25.419522 kubelet[2066]: I1213 06:23:25.419500 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:25.420232 env[1185]: time="2024-12-13T06:23:25.419958728Z" level=info msg="StopPodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\"" Dec 13 06:23:25.482231 env[1185]: time="2024-12-13T06:23:25.482149368Z" level=error msg="StopPodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" failed" error="failed to destroy network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:25.482817 kubelet[2066]: E1213 06:23:25.482788 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:25.482930 kubelet[2066]: E1213 06:23:25.482909 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024"} Dec 13 06:23:25.482977 kubelet[2066]: E1213 06:23:25.482955 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2566e160-4771-4e18-b20b-c749e8b20e8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 06:23:25.483055 kubelet[2066]: E1213 06:23:25.482989 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2566e160-4771-4e18-b20b-c749e8b20e8a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" podUID="2566e160-4771-4e18-b20b-c749e8b20e8a" Dec 13 06:23:25.488443 env[1185]: time="2024-12-13T06:23:25.488390434Z" level=error msg="StopPodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" failed" error="failed to destroy network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:25.488657 kubelet[2066]: E1213 06:23:25.488638 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:25.488767 kubelet[2066]: E1213 06:23:25.488681 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4"} Dec 13 06:23:25.488767 kubelet[2066]: E1213 06:23:25.488732 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f7e65410-005f-4da2-975b-33dd208722a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 06:23:25.488767 kubelet[2066]: E1213 06:23:25.488763 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f7e65410-005f-4da2-975b-33dd208722a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" podUID="f7e65410-005f-4da2-975b-33dd208722a6" Dec 13 06:23:25.502020 env[1185]: time="2024-12-13T06:23:25.501962312Z" level=error msg="StopPodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" failed" error="failed to destroy network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:25.502255 kubelet[2066]: E1213 06:23:25.502236 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:25.502331 kubelet[2066]: E1213 06:23:25.502278 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a"} Dec 13 06:23:25.502331 kubelet[2066]: E1213 06:23:25.502314 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"76237571-200e-49e8-8fb8-8cf5bae35e01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 06:23:25.502484 kubelet[2066]: E1213 06:23:25.502357 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"76237571-200e-49e8-8fb8-8cf5bae35e01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" podUID="76237571-200e-49e8-8fb8-8cf5bae35e01" Dec 13 06:23:25.506411 env[1185]: time="2024-12-13T06:23:25.506349799Z" level=error msg="StopPodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" failed" error="failed to destroy network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:25.506570 kubelet[2066]: E1213 06:23:25.506553 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:25.506652 kubelet[2066]: E1213 06:23:25.506588 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693"} Dec 13 06:23:25.506652 kubelet[2066]: E1213 06:23:25.506634 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 06:23:25.506784 kubelet[2066]: E1213 06:23:25.506662 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-vb29h" podUID="ed610c70-ccfa-458e-b18e-b7a2f0ecd55c" Dec 13 06:23:25.518920 env[1185]: time="2024-12-13T06:23:25.518861698Z" level=error msg="StopPodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" failed" error="failed to destroy network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:25.519286 kubelet[2066]: E1213 06:23:25.519266 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:25.519374 kubelet[2066]: E1213 06:23:25.519305 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266"} Dec 13 06:23:25.519374 kubelet[2066]: E1213 06:23:25.519340 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cebca8c8-2276-4431-ac1a-60136909835c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 06:23:25.519515 kubelet[2066]: E1213 06:23:25.519378 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cebca8c8-2276-4431-ac1a-60136909835c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-htghs" podUID="cebca8c8-2276-4431-ac1a-60136909835c" Dec 13 06:23:26.233624 systemd[1]: Created slice kubepods-besteffort-pod0a2d5a25_886a_4c35_a2cc_9586bc77694e.slice. Dec 13 06:23:26.236540 env[1185]: time="2024-12-13T06:23:26.236479836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh75,Uid:0a2d5a25-886a-4c35-a2cc-9586bc77694e,Namespace:calico-system,Attempt:0,}" Dec 13 06:23:26.329106 env[1185]: time="2024-12-13T06:23:26.329003020Z" level=error msg="Failed to destroy network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:26.337524 env[1185]: time="2024-12-13T06:23:26.333055174Z" level=error msg="encountered an error cleaning up failed sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:26.337524 env[1185]: time="2024-12-13T06:23:26.333125735Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh75,Uid:0a2d5a25-886a-4c35-a2cc-9586bc77694e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:26.336377 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926-shm.mount: Deactivated successfully. Dec 13 06:23:26.337896 kubelet[2066]: E1213 06:23:26.333345 2066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:26.337896 kubelet[2066]: E1213 06:23:26.333396 2066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:26.337896 kubelet[2066]: E1213 06:23:26.333423 2066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-drh75" Dec 13 06:23:26.338046 kubelet[2066]: E1213 06:23:26.333477 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-drh75_calico-system(0a2d5a25-886a-4c35-a2cc-9586bc77694e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-drh75_calico-system(0a2d5a25-886a-4c35-a2cc-9586bc77694e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:26.422065 kubelet[2066]: I1213 06:23:26.422015 2066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:26.424335 env[1185]: time="2024-12-13T06:23:26.422635009Z" level=info msg="StopPodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\"" Dec 13 06:23:26.467366 env[1185]: time="2024-12-13T06:23:26.467305827Z" level=error msg="StopPodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" failed" error="failed to destroy network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 06:23:26.467542 kubelet[2066]: E1213 06:23:26.467529 2066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:26.467604 kubelet[2066]: E1213 06:23:26.467579 2066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926"} Dec 13 06:23:26.467653 kubelet[2066]: E1213 06:23:26.467615 2066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 06:23:26.467653 kubelet[2066]: E1213 06:23:26.467644 2066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a2d5a25-886a-4c35-a2cc-9586bc77694e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-drh75" podUID="0a2d5a25-886a-4c35-a2cc-9586bc77694e" Dec 13 06:23:33.032374 kubelet[2066]: I1213 06:23:33.031915 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 06:23:33.164773 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 06:23:33.169876 kernel: audit: type=1325 audit(1734071013.160:995): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:33.172178 kernel: audit: type=1300 audit(1734071013.160:995): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdf738e6a0 a2=0 a3=7ffdf738e68c items=0 ppid=2243 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.172227 kernel: audit: type=1327 audit(1734071013.160:995): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:33.160000 audit[3113]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:33.175909 kernel: audit: type=1325 audit(1734071013.172:996): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:33.160000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdf738e6a0 a2=0 a3=7ffdf738e68c items=0 ppid=2243 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.183455 kernel: audit: type=1300 audit(1734071013.172:996): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdf738e6a0 a2=0 a3=7ffdf738e68c items=0 ppid=2243 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.183513 kernel: audit: type=1327 audit(1734071013.172:996): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:33.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:33.172000 audit[3113]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:33.172000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdf738e6a0 a2=0 a3=7ffdf738e68c items=0 ppid=2243 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:33.291661 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3436906268.mount: Deactivated successfully. Dec 13 06:23:33.336411 env[1185]: time="2024-12-13T06:23:33.336284509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:33.339059 env[1185]: time="2024-12-13T06:23:33.339021682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:33.341338 env[1185]: time="2024-12-13T06:23:33.341290735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:33.343269 env[1185]: time="2024-12-13T06:23:33.343248070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:33.343965 env[1185]: time="2024-12-13T06:23:33.343938040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 06:23:33.401242 env[1185]: time="2024-12-13T06:23:33.401203560Z" level=info msg="CreateContainer within sandbox \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 06:23:33.417739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount636627639.mount: Deactivated successfully. Dec 13 06:23:33.421875 env[1185]: time="2024-12-13T06:23:33.421838402Z" level=info msg="CreateContainer within sandbox \"d37404c5400aced039844a06ab897756c7eecce65cfcf57669bcde1787905b61\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be\"" Dec 13 06:23:33.423560 env[1185]: time="2024-12-13T06:23:33.422657862Z" level=info msg="StartContainer for \"c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be\"" Dec 13 06:23:33.448032 systemd[1]: Started cri-containerd-c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be.scope. Dec 13 06:23:33.491634 kernel: audit: type=1400 audit(1734071013.483:997): avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.491796 kernel: audit: type=1300 audit(1734071013.483:997): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0ff5d39098 items=0 ppid=2531 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0ff5d39098 items=0 ppid=2531 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336656463613933653636656232626465623332643863363666316435 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.499326 kernel: audit: type=1327 audit(1734071013.483:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336656463613933653636656232626465623332643863363666316435 Dec 13 06:23:33.499412 kernel: audit: type=1400 audit(1734071013.483:998): avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.483000 audit: BPF prog-id=136 op=LOAD Dec 13 06:23:33.483000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c67f8 items=0 ppid=2531 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336656463613933653636656232626465623332643863363666316435 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit: BPF prog-id=137 op=LOAD Dec 13 06:23:33.490000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c6848 items=0 ppid=2531 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336656463613933653636656232626465623332643863363666316435 Dec 13 06:23:33.490000 audit: BPF prog-id=137 op=UNLOAD Dec 13 06:23:33.490000 audit: BPF prog-id=136 op=UNLOAD Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:33.490000 audit: BPF prog-id=138 op=LOAD Dec 13 06:23:33.490000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c68d8 items=0 ppid=2531 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:33.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336656463613933653636656232626465623332643863363666316435 Dec 13 06:23:33.519761 env[1185]: time="2024-12-13T06:23:33.518034566Z" level=info msg="StartContainer for \"c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be\" returns successfully" Dec 13 06:23:33.747504 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 06:23:33.747882 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 06:23:34.517545 kubelet[2066]: I1213 06:23:34.517504 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-76p4m" podStartSLOduration=4.330642657 podStartE2EDuration="25.51249231s" podCreationTimestamp="2024-12-13 06:23:09 +0000 UTC" firstStartedPulling="2024-12-13 06:23:12.162900607 +0000 UTC m=+24.190525240" lastFinishedPulling="2024-12-13 06:23:33.34475026 +0000 UTC m=+45.372374893" observedRunningTime="2024-12-13 06:23:34.511965998 +0000 UTC m=+46.539590653" watchObservedRunningTime="2024-12-13 06:23:34.51249231 +0000 UTC m=+46.540116967" Dec 13 06:23:35.155000 audit[3223]: AVC avc: denied { write } for pid=3223 comm="tee" name="fd" dev="proc" ino=29385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.155000 audit[3223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4a7199f7 a2=241 a3=1b6 items=1 ppid=3192 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.155000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 06:23:35.155000 audit: PATH item=0 name="/dev/fd/63" inode=29368 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.176000 audit[3236]: AVC avc: denied { write } for pid=3236 comm="tee" name="fd" dev="proc" ino=29406 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.191000 audit[3241]: AVC avc: denied { write } for pid=3241 comm="tee" name="fd" dev="proc" ino=29413 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.191000 audit[3241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfbfc09f6 a2=241 a3=1b6 items=1 ppid=3199 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.176000 audit[3236]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedaa24a06 a2=241 a3=1b6 items=1 ppid=3194 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.176000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 06:23:35.176000 audit: PATH item=0 name="/dev/fd/63" inode=29393 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.191000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 06:23:35.191000 audit: PATH item=0 name="/dev/fd/63" inode=29396 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.191000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.204000 audit[3254]: AVC avc: denied { write } for pid=3254 comm="tee" name="fd" dev="proc" ino=29423 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.204000 audit[3254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe94412a06 a2=241 a3=1b6 items=1 ppid=3201 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.204000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 06:23:35.204000 audit: PATH item=0 name="/dev/fd/63" inode=29415 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.210000 audit[3261]: AVC avc: denied { write } for pid=3261 comm="tee" name="fd" dev="proc" ino=29428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.216000 audit[3256]: AVC avc: denied { write } for pid=3256 comm="tee" name="fd" dev="proc" ino=29432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.216000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff36646a06 a2=241 a3=1b6 items=1 ppid=3196 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.219000 audit[3251]: AVC avc: denied { write } for pid=3251 comm="tee" name="fd" dev="proc" ino=29436 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 06:23:35.210000 audit[3261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb42c6a07 a2=241 a3=1b6 items=1 ppid=3203 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.210000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 06:23:35.210000 audit: PATH item=0 name="/dev/fd/63" inode=29420 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.219000 audit[3251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3e95aa08 a2=241 a3=1b6 items=1 ppid=3190 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.219000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 06:23:35.219000 audit: PATH item=0 name="/dev/fd/63" inode=28616 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.216000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 06:23:35.216000 audit: PATH item=0 name="/dev/fd/63" inode=28618 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 06:23:35.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.468000 audit: BPF prog-id=139 op=LOAD Dec 13 06:23:35.468000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc54aa71c0 a2=98 a3=3 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.468000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.469000 audit: BPF prog-id=139 op=UNLOAD Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit: BPF prog-id=140 op=LOAD Dec 13 06:23:35.469000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc54aa6fa0 a2=74 a3=540051 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.469000 audit: BPF prog-id=140 op=UNLOAD Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.469000 audit: BPF prog-id=141 op=LOAD Dec 13 06:23:35.469000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc54aa6fd0 a2=94 a3=2 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.470000 audit: BPF prog-id=141 op=UNLOAD Dec 13 06:23:35.522419 systemd[1]: run-containerd-runc-k8s.io-c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be-runc.i7gmhh.mount: Deactivated successfully. Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit: BPF prog-id=142 op=LOAD Dec 13 06:23:35.627000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc54aa6e90 a2=40 a3=1 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.627000 audit: BPF prog-id=142 op=UNLOAD Dec 13 06:23:35.627000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.627000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc54aa6f60 a2=50 a3=7ffc54aa7040 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc54aa6ea0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc54aa6ed0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc54aa6de0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc54aa6ef0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc54aa6ed0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc54aa6ec0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc54aa6ef0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc54aa6ed0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc54aa6ef0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc54aa6ec0 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc54aa6f30 a2=28 a3=0 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc54aa6ce0 a2=50 a3=1 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit: BPF prog-id=143 op=LOAD Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc54aa6ce0 a2=94 a3=5 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit: BPF prog-id=143 op=UNLOAD Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc54aa6d90 a2=50 a3=1 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc54aa6eb0 a2=4 a3=38 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.638000 audit[3299]: AVC avc: denied { confidentiality } for pid=3299 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 06:23:35.638000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc54aa6f00 a2=94 a3=6 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.638000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { confidentiality } for pid=3299 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 06:23:35.639000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc54aa66b0 a2=94 a3=83 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.639000 audit[3299]: AVC avc: denied { confidentiality } for pid=3299 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 06:23:35.639000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc54aa66b0 a2=94 a3=83 items=0 ppid=3195 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit: BPF prog-id=144 op=LOAD Dec 13 06:23:35.649000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdf3cc670 a2=98 a3=1999999999999999 items=0 ppid=3195 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.649000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 06:23:35.649000 audit: BPF prog-id=144 op=UNLOAD Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit: BPF prog-id=145 op=LOAD Dec 13 06:23:35.649000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdf3cc550 a2=74 a3=ffff items=0 ppid=3195 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.649000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 06:23:35.649000 audit: BPF prog-id=145 op=UNLOAD Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.649000 audit: BPF prog-id=146 op=LOAD Dec 13 06:23:35.649000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdf3cc590 a2=40 a3=7fffdf3cc770 items=0 ppid=3195 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.649000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 06:23:35.649000 audit: BPF prog-id=146 op=UNLOAD Dec 13 06:23:35.749295 systemd-networkd[1029]: vxlan.calico: Link UP Dec 13 06:23:35.749303 systemd-networkd[1029]: vxlan.calico: Gained carrier Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.791000 audit: BPF prog-id=147 op=LOAD Dec 13 06:23:35.791000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc475d9be0 a2=98 a3=ffffffff items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.791000 audit: BPF prog-id=147 op=UNLOAD Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit: BPF prog-id=148 op=LOAD Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc475d99f0 a2=74 a3=540051 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit: BPF prog-id=148 op=UNLOAD Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit: BPF prog-id=149 op=LOAD Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc475d9a20 a2=94 a3=2 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit: BPF prog-id=149 op=UNLOAD Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc475d98f0 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc475d9920 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc475d9830 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc475d9940 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc475d9920 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc475d9910 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc475d9940 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc475d9920 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc475d9940 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc475d9910 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc475d9980 a2=28 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.792000 audit: BPF prog-id=150 op=LOAD Dec 13 06:23:35.792000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc475d97f0 a2=40 a3=0 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.792000 audit: BPF prog-id=150 op=UNLOAD Dec 13 06:23:35.793000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.793000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc475d97e0 a2=50 a3=2800 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.793000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.794000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.794000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc475d97e0 a2=50 a3=2800 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.794000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit: BPF prog-id=151 op=LOAD Dec 13 06:23:35.795000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc475d9000 a2=94 a3=2 items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.795000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.795000 audit: BPF prog-id=151 op=UNLOAD Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.795000 audit: BPF prog-id=152 op=LOAD Dec 13 06:23:35.795000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc475d9100 a2=94 a3=2d items=0 ppid=3195 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.795000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit: BPF prog-id=153 op=LOAD Dec 13 06:23:35.808000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff49babac0 a2=98 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.808000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.808000 audit: BPF prog-id=153 op=UNLOAD Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit: BPF prog-id=154 op=LOAD Dec 13 06:23:35.808000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff49bab8a0 a2=74 a3=540051 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.808000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.808000 audit: BPF prog-id=154 op=UNLOAD Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.808000 audit: BPF prog-id=155 op=LOAD Dec 13 06:23:35.808000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff49bab8d0 a2=94 a3=2 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.808000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.808000 audit: BPF prog-id=155 op=UNLOAD Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit: BPF prog-id=156 op=LOAD Dec 13 06:23:35.949000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff49bab790 a2=40 a3=1 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.949000 audit: BPF prog-id=156 op=UNLOAD Dec 13 06:23:35.949000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.949000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff49bab860 a2=50 a3=7fff49bab940 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff49bab7a0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff49bab7d0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff49bab6e0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff49bab7f0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff49bab7d0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff49bab7c0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff49bab7f0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff49bab7d0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff49bab7f0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff49bab7c0 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.960000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.960000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff49bab830 a2=28 a3=0 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff49bab5e0 a2=50 a3=1 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit: BPF prog-id=157 op=LOAD Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff49bab5e0 a2=94 a3=5 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit: BPF prog-id=157 op=UNLOAD Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff49bab690 a2=50 a3=1 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff49bab7b0 a2=4 a3=38 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { confidentiality } for pid=3356 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff49bab800 a2=94 a3=6 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { confidentiality } for pid=3356 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff49baafb0 a2=94 a3=83 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { perfmon } for pid=3356 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.961000 audit[3356]: AVC avc: denied { confidentiality } for pid=3356 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 06:23:35.961000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff49baafb0 a2=94 a3=83 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.962000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.962000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff49bac9f0 a2=10 a3=f1f00800 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.962000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.962000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff49bac890 a2=10 a3=3 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.962000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.962000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff49bac830 a2=10 a3=3 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.962000 audit[3356]: AVC avc: denied { bpf } for pid=3356 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:35.962000 audit[3356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff49bac830 a2=10 a3=7 items=0 ppid=3195 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:35.962000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 06:23:35.972000 audit: BPF prog-id=152 op=UNLOAD Dec 13 06:23:36.039000 audit[3392]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:36.039000 audit[3392]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc47c81b70 a2=0 a3=7ffc47c81b5c items=0 ppid=3195 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:36.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:36.045000 audit[3393]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3393 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:36.045000 audit[3393]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc8e4b1b70 a2=0 a3=7ffc8e4b1b5c items=0 ppid=3195 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:36.045000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:36.053000 audit[3395]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:36.053000 audit[3395]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdcf7f4270 a2=0 a3=7ffdcf7f425c items=0 ppid=3195 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:36.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:36.059000 audit[3394]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3394 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:36.059000 audit[3394]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc317f0780 a2=0 a3=7ffc317f076c items=0 ppid=3195 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:36.059000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:36.527208 systemd[1]: run-containerd-runc-k8s.io-c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be-runc.YNB5Tu.mount: Deactivated successfully. Dec 13 06:23:37.057267 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Dec 13 06:23:37.224525 env[1185]: time="2024-12-13T06:23:37.224299371Z" level=info msg="StopPodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\"" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.305 [INFO][3448] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.305 [INFO][3448] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" iface="eth0" netns="/var/run/netns/cni-9a27683b-8550-5127-0e87-93c52af12ca7" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.305 [INFO][3448] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" iface="eth0" netns="/var/run/netns/cni-9a27683b-8550-5127-0e87-93c52af12ca7" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.306 [INFO][3448] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" iface="eth0" netns="/var/run/netns/cni-9a27683b-8550-5127-0e87-93c52af12ca7" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.306 [INFO][3448] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.306 [INFO][3448] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.394 [INFO][3454] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.396 [INFO][3454] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.396 [INFO][3454] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.414 [WARNING][3454] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.414 [INFO][3454] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.418 [INFO][3454] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:37.425861 env[1185]: 2024-12-13 06:23:37.421 [INFO][3448] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:37.428882 systemd[1]: run-netns-cni\x2d9a27683b\x2d8550\x2d5127\x2d0e87\x2d93c52af12ca7.mount: Deactivated successfully. Dec 13 06:23:37.430767 env[1185]: time="2024-12-13T06:23:37.430576947Z" level=info msg="TearDown network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" successfully" Dec 13 06:23:37.430767 env[1185]: time="2024-12-13T06:23:37.430621337Z" level=info msg="StopPodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" returns successfully" Dec 13 06:23:37.432022 env[1185]: time="2024-12-13T06:23:37.431996439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vb29h,Uid:ed610c70-ccfa-458e-b18e-b7a2f0ecd55c,Namespace:kube-system,Attempt:1,}" Dec 13 06:23:37.610606 systemd-networkd[1029]: cali3d3214a5daa: Link UP Dec 13 06:23:37.613991 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 06:23:37.614092 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3d3214a5daa: link becomes ready Dec 13 06:23:37.614247 systemd-networkd[1029]: cali3d3214a5daa: Gained carrier Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.492 [INFO][3460] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0 coredns-76f75df574- kube-system ed610c70-ccfa-458e-b18e-b7a2f0ecd55c 795 0 2024-12-13 06:23:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-3em3z.gb1.brightbox.com coredns-76f75df574-vb29h eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3d3214a5daa [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.493 [INFO][3460] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.547 [INFO][3472] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" HandleID="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.561 [INFO][3472] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" HandleID="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318b30), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-3em3z.gb1.brightbox.com", "pod":"coredns-76f75df574-vb29h", "timestamp":"2024-12-13 06:23:37.547229781 +0000 UTC"}, Hostname:"srv-3em3z.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.561 [INFO][3472] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.561 [INFO][3472] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.561 [INFO][3472] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3em3z.gb1.brightbox.com' Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.564 [INFO][3472] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.570 [INFO][3472] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.576 [INFO][3472] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.578 [INFO][3472] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.580 [INFO][3472] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.580 [INFO][3472] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.587 [INFO][3472] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251 Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.593 [INFO][3472] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.600 [INFO][3472] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.193/26] block=192.168.101.192/26 handle="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.600 [INFO][3472] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.193/26] handle="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.600 [INFO][3472] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:37.639168 env[1185]: 2024-12-13 06:23:37.600 [INFO][3472] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.193/26] IPv6=[] ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" HandleID="k8s-pod-network.403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.640673 env[1185]: 2024-12-13 06:23:37.604 [INFO][3460] cni-plugin/k8s.go 386: Populated endpoint ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-vb29h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d3214a5daa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:37.640673 env[1185]: 2024-12-13 06:23:37.604 [INFO][3460] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.193/32] ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.640673 env[1185]: 2024-12-13 06:23:37.604 [INFO][3460] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3d3214a5daa ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.640673 env[1185]: 2024-12-13 06:23:37.615 [INFO][3460] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.640673 env[1185]: 2024-12-13 06:23:37.615 [INFO][3460] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251", Pod:"coredns-76f75df574-vb29h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d3214a5daa", MAC:"12:ba:51:a0:f9:70", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:37.640673 env[1185]: 2024-12-13 06:23:37.627 [INFO][3460] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251" Namespace="kube-system" Pod="coredns-76f75df574-vb29h" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:37.662412 env[1185]: time="2024-12-13T06:23:37.659197260Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:37.662412 env[1185]: time="2024-12-13T06:23:37.659234293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:37.662412 env[1185]: time="2024-12-13T06:23:37.659244586Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:37.662412 env[1185]: time="2024-12-13T06:23:37.659362759Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251 pid=3499 runtime=io.containerd.runc.v2 Dec 13 06:23:37.676000 audit[3509]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3509 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:37.676000 audit[3509]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcadf9a950 a2=0 a3=7ffcadf9a93c items=0 ppid=3195 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:37.688992 systemd[1]: run-containerd-runc-k8s.io-403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251-runc.2U60Zf.mount: Deactivated successfully. Dec 13 06:23:37.692353 systemd[1]: Started cri-containerd-403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251.scope. Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.711000 audit: BPF prog-id=158 op=LOAD Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336635616361646464383835393436663136326432396535613535 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336635616361646464383835393436663136326432396535613535 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit: BPF prog-id=159 op=LOAD Dec 13 06:23:37.712000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e6630 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336635616361646464383835393436663136326432396535613535 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.712000 audit: BPF prog-id=160 op=LOAD Dec 13 06:23:37.712000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e6678 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336635616361646464383835393436663136326432396535613535 Dec 13 06:23:37.714000 audit: BPF prog-id=160 op=UNLOAD Dec 13 06:23:37.714000 audit: BPF prog-id=159 op=UNLOAD Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.714000 audit: BPF prog-id=161 op=LOAD Dec 13 06:23:37.714000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e6a88 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430336635616361646464383835393436663136326432396535613535 Dec 13 06:23:37.754542 env[1185]: time="2024-12-13T06:23:37.754496973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vb29h,Uid:ed610c70-ccfa-458e-b18e-b7a2f0ecd55c,Namespace:kube-system,Attempt:1,} returns sandbox id \"403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251\"" Dec 13 06:23:37.761494 env[1185]: time="2024-12-13T06:23:37.761463008Z" level=info msg="CreateContainer within sandbox \"403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 06:23:37.771005 env[1185]: time="2024-12-13T06:23:37.770970776Z" level=info msg="CreateContainer within sandbox \"403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"89e8a1419362ca064c55f7062c455cbfea7e486ef2b31dd1b37e92ed5e460899\"" Dec 13 06:23:37.772925 env[1185]: time="2024-12-13T06:23:37.772880716Z" level=info msg="StartContainer for \"89e8a1419362ca064c55f7062c455cbfea7e486ef2b31dd1b37e92ed5e460899\"" Dec 13 06:23:37.790890 systemd[1]: Started cri-containerd-89e8a1419362ca064c55f7062c455cbfea7e486ef2b31dd1b37e92ed5e460899.scope. Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.812000 audit: BPF prog-id=162 op=LOAD Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3499 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839653861313431393336326361303634633535663730363263343535 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3499 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839653861313431393336326361303634633535663730363263343535 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit: BPF prog-id=163 op=LOAD Dec 13 06:23:37.813000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003aeea0 items=0 ppid=3499 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839653861313431393336326361303634633535663730363263343535 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit: BPF prog-id=164 op=LOAD Dec 13 06:23:37.813000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003aeee8 items=0 ppid=3499 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839653861313431393336326361303634633535663730363263343535 Dec 13 06:23:37.813000 audit: BPF prog-id=164 op=UNLOAD Dec 13 06:23:37.813000 audit: BPF prog-id=163 op=UNLOAD Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:37.813000 audit: BPF prog-id=165 op=LOAD Dec 13 06:23:37.813000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003af2f8 items=0 ppid=3499 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:37.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839653861313431393336326361303634633535663730363263343535 Dec 13 06:23:37.830349 env[1185]: time="2024-12-13T06:23:37.830307127Z" level=info msg="StartContainer for \"89e8a1419362ca064c55f7062c455cbfea7e486ef2b31dd1b37e92ed5e460899\" returns successfully" Dec 13 06:23:38.228547 env[1185]: time="2024-12-13T06:23:38.228354078Z" level=info msg="StopPodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\"" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.292 [INFO][3585] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.293 [INFO][3585] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" iface="eth0" netns="/var/run/netns/cni-8ce6f32a-86dc-979f-693f-243699399ff0" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.293 [INFO][3585] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" iface="eth0" netns="/var/run/netns/cni-8ce6f32a-86dc-979f-693f-243699399ff0" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.294 [INFO][3585] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" iface="eth0" netns="/var/run/netns/cni-8ce6f32a-86dc-979f-693f-243699399ff0" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.294 [INFO][3585] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.294 [INFO][3585] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.332 [INFO][3592] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.333 [INFO][3592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.333 [INFO][3592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.340 [WARNING][3592] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.341 [INFO][3592] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.344 [INFO][3592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:38.348228 env[1185]: 2024-12-13 06:23:38.346 [INFO][3585] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:38.349322 env[1185]: time="2024-12-13T06:23:38.348656352Z" level=info msg="TearDown network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" successfully" Dec 13 06:23:38.349322 env[1185]: time="2024-12-13T06:23:38.348687109Z" level=info msg="StopPodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" returns successfully" Dec 13 06:23:38.349767 env[1185]: time="2024-12-13T06:23:38.349742165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-29r6m,Uid:f7e65410-005f-4da2-975b-33dd208722a6,Namespace:calico-apiserver,Attempt:1,}" Dec 13 06:23:38.522074 systemd[1]: run-netns-cni\x2d8ce6f32a\x2d86dc\x2d979f\x2d693f\x2d243699399ff0.mount: Deactivated successfully. Dec 13 06:23:38.524531 kubelet[2066]: I1213 06:23:38.524497 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-vb29h" podStartSLOduration=38.524424732 podStartE2EDuration="38.524424732s" podCreationTimestamp="2024-12-13 06:23:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 06:23:38.517554105 +0000 UTC m=+50.545178762" watchObservedRunningTime="2024-12-13 06:23:38.524424732 +0000 UTC m=+50.552049388" Dec 13 06:23:38.559323 systemd-networkd[1029]: cali6b4fe2c9071: Link UP Dec 13 06:23:38.565476 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b4fe2c9071: link becomes ready Dec 13 06:23:38.569889 kernel: kauditd_printk_skb: 671 callbacks suppressed Dec 13 06:23:38.569965 kernel: audit: type=1325 audit(1734071018.565:1142): table=filter:102 family=2 entries=16 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.565000 audit[3619]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.565134 systemd-networkd[1029]: cali6b4fe2c9071: Gained carrier Dec 13 06:23:38.565000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2f93f0a0 a2=0 a3=7fff2f93f08c items=0 ppid=2243 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.587526 kernel: audit: type=1300 audit(1734071018.565:1142): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2f93f0a0 a2=0 a3=7fff2f93f08c items=0 ppid=2243 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.587617 kernel: audit: type=1327 audit(1734071018.565:1142): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.580000 audit[3619]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.590733 kernel: audit: type=1325 audit(1734071018.580:1143): table=nat:103 family=2 entries=14 op=nft_register_rule pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.580000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff2f93f0a0 a2=0 a3=0 items=0 ppid=2243 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.595728 kernel: audit: type=1300 audit(1734071018.580:1143): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff2f93f0a0 a2=0 a3=0 items=0 ppid=2243 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.398 [INFO][3598] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0 calico-apiserver-75fd9c9ddf- calico-apiserver f7e65410-005f-4da2-975b-33dd208722a6 804 0 2024-12-13 06:23:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75fd9c9ddf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-3em3z.gb1.brightbox.com calico-apiserver-75fd9c9ddf-29r6m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6b4fe2c9071 [] []}} ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.399 [INFO][3598] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.450 [INFO][3609] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" HandleID="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.479 [INFO][3609] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" HandleID="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318960), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-3em3z.gb1.brightbox.com", "pod":"calico-apiserver-75fd9c9ddf-29r6m", "timestamp":"2024-12-13 06:23:38.450775943 +0000 UTC"}, Hostname:"srv-3em3z.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.479 [INFO][3609] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.479 [INFO][3609] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.479 [INFO][3609] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3em3z.gb1.brightbox.com' Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.481 [INFO][3609] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.489 [INFO][3609] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.498 [INFO][3609] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.511 [INFO][3609] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.529 [INFO][3609] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.529 [INFO][3609] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.535 [INFO][3609] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499 Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.542 [INFO][3609] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.551 [INFO][3609] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.194/26] block=192.168.101.192/26 handle="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.551 [INFO][3609] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.194/26] handle="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.551 [INFO][3609] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:38.597700 env[1185]: 2024-12-13 06:23:38.551 [INFO][3609] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.194/26] IPv6=[] ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" HandleID="k8s-pod-network.05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.598860 env[1185]: 2024-12-13 06:23:38.553 [INFO][3598] cni-plugin/k8s.go 386: Populated endpoint ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7e65410-005f-4da2-975b-33dd208722a6", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-75fd9c9ddf-29r6m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b4fe2c9071", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:38.598860 env[1185]: 2024-12-13 06:23:38.553 [INFO][3598] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.194/32] ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.598860 env[1185]: 2024-12-13 06:23:38.553 [INFO][3598] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b4fe2c9071 ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.598860 env[1185]: 2024-12-13 06:23:38.570 [INFO][3598] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.598860 env[1185]: 2024-12-13 06:23:38.571 [INFO][3598] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7e65410-005f-4da2-975b-33dd208722a6", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499", Pod:"calico-apiserver-75fd9c9ddf-29r6m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b4fe2c9071", MAC:"ca:31:b3:22:25:b8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:38.598860 env[1185]: 2024-12-13 06:23:38.595 [INFO][3598] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-29r6m" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:38.600761 kernel: audit: type=1327 audit(1734071018.580:1143): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.608000 audit[3628]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.608000 audit[3628]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd044d88e0 a2=0 a3=7ffd044d88cc items=0 ppid=2243 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.616195 kernel: audit: type=1325 audit(1734071018.608:1144): table=filter:104 family=2 entries=13 op=nft_register_rule pid=3628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.616278 kernel: audit: type=1300 audit(1734071018.608:1144): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd044d88e0 a2=0 a3=7ffd044d88cc items=0 ppid=2243 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.616308 kernel: audit: type=1327 audit(1734071018.608:1144): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.618000 audit[3628]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.618000 audit[3628]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd044d88e0 a2=0 a3=7ffd044d88cc items=0 ppid=2243 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:38.622753 kernel: audit: type=1325 audit(1734071018.618:1145): table=nat:105 family=2 entries=35 op=nft_register_chain pid=3628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:38.629189 env[1185]: time="2024-12-13T06:23:38.629123963Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:38.629365 env[1185]: time="2024-12-13T06:23:38.629342416Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:38.629465 env[1185]: time="2024-12-13T06:23:38.629445598Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:38.630817 env[1185]: time="2024-12-13T06:23:38.630763466Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499 pid=3642 runtime=io.containerd.runc.v2 Dec 13 06:23:38.637000 audit[3653]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=3653 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:38.637000 audit[3653]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffe0bd6cfe0 a2=0 a3=7ffe0bd6cfcc items=0 ppid=3195 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.637000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:38.652309 systemd[1]: Started cri-containerd-05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499.scope. Dec 13 06:23:38.657702 systemd[1]: run-containerd-runc-k8s.io-05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499-runc.oPOrGp.mount: Deactivated successfully. Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.680000 audit: BPF prog-id=166 op=LOAD Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3642 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616232376562323462323538616362353634396364333432326161 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3642 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616232376562323462323538616362353634396364333432326161 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit: BPF prog-id=167 op=LOAD Dec 13 06:23:38.682000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000321a60 items=0 ppid=3642 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616232376562323462323538616362353634396364333432326161 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit: BPF prog-id=168 op=LOAD Dec 13 06:23:38.682000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000321aa8 items=0 ppid=3642 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616232376562323462323538616362353634396364333432326161 Dec 13 06:23:38.682000 audit: BPF prog-id=168 op=UNLOAD Dec 13 06:23:38.682000 audit: BPF prog-id=167 op=UNLOAD Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:38.682000 audit: BPF prog-id=169 op=LOAD Dec 13 06:23:38.682000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000321eb8 items=0 ppid=3642 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035616232376562323462323538616362353634396364333432326161 Dec 13 06:23:38.717552 env[1185]: time="2024-12-13T06:23:38.717503661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-29r6m,Uid:f7e65410-005f-4da2-975b-33dd208722a6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499\"" Dec 13 06:23:38.722198 env[1185]: time="2024-12-13T06:23:38.722169120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 06:23:39.225476 env[1185]: time="2024-12-13T06:23:39.225391206Z" level=info msg="StopPodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\"" Dec 13 06:23:39.225992 env[1185]: time="2024-12-13T06:23:39.225871341Z" level=info msg="StopPodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\"" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.321 [INFO][3712] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.321 [INFO][3712] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" iface="eth0" netns="/var/run/netns/cni-c3b7a6c4-1105-f2e7-a7d9-9b913aab04dc" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.321 [INFO][3712] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" iface="eth0" netns="/var/run/netns/cni-c3b7a6c4-1105-f2e7-a7d9-9b913aab04dc" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.321 [INFO][3712] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" iface="eth0" netns="/var/run/netns/cni-c3b7a6c4-1105-f2e7-a7d9-9b913aab04dc" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.321 [INFO][3712] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.321 [INFO][3712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.383 [INFO][3728] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.383 [INFO][3728] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.384 [INFO][3728] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.406 [WARNING][3728] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.406 [INFO][3728] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.414 [INFO][3728] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:39.418152 env[1185]: 2024-12-13 06:23:39.416 [INFO][3712] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:39.421198 systemd[1]: run-netns-cni\x2dc3b7a6c4\x2d1105\x2df2e7\x2da7d9\x2d9b913aab04dc.mount: Deactivated successfully. Dec 13 06:23:39.422756 env[1185]: time="2024-12-13T06:23:39.422722513Z" level=info msg="TearDown network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" successfully" Dec 13 06:23:39.422913 env[1185]: time="2024-12-13T06:23:39.422895829Z" level=info msg="StopPodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" returns successfully" Dec 13 06:23:39.425025 env[1185]: time="2024-12-13T06:23:39.424999150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bd75c99-q5h75,Uid:76237571-200e-49e8-8fb8-8cf5bae35e01,Namespace:calico-system,Attempt:1,}" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.309 [INFO][3711] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.309 [INFO][3711] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" iface="eth0" netns="/var/run/netns/cni-6bf4545f-acd1-9d10-7a74-59ff38991575" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.309 [INFO][3711] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" iface="eth0" netns="/var/run/netns/cni-6bf4545f-acd1-9d10-7a74-59ff38991575" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.309 [INFO][3711] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" iface="eth0" netns="/var/run/netns/cni-6bf4545f-acd1-9d10-7a74-59ff38991575" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.309 [INFO][3711] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.309 [INFO][3711] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.397 [INFO][3724] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.397 [INFO][3724] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.414 [INFO][3724] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.433 [WARNING][3724] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.433 [INFO][3724] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.445 [INFO][3724] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:39.448382 env[1185]: 2024-12-13 06:23:39.447 [INFO][3711] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:39.449221 env[1185]: time="2024-12-13T06:23:39.449182070Z" level=info msg="TearDown network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" successfully" Dec 13 06:23:39.449315 env[1185]: time="2024-12-13T06:23:39.449298783Z" level=info msg="StopPodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" returns successfully" Dec 13 06:23:39.451344 env[1185]: time="2024-12-13T06:23:39.451313649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-htghs,Uid:cebca8c8-2276-4431-ac1a-60136909835c,Namespace:kube-system,Attempt:1,}" Dec 13 06:23:39.501942 systemd-networkd[1029]: cali3d3214a5daa: Gained IPv6LL Dec 13 06:23:39.522466 systemd[1]: run-netns-cni\x2d6bf4545f\x2dacd1\x2d9d10\x2d7a74\x2d59ff38991575.mount: Deactivated successfully. Dec 13 06:23:39.650942 systemd-networkd[1029]: cali32ade25fe18: Link UP Dec 13 06:23:39.654984 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 06:23:39.655082 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32ade25fe18: link becomes ready Dec 13 06:23:39.654390 systemd-networkd[1029]: cali32ade25fe18: Gained carrier Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.526 [INFO][3736] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0 calico-kube-controllers-86bd75c99- calico-system 76237571-200e-49e8-8fb8-8cf5bae35e01 823 0 2024-12-13 06:23:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:86bd75c99 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-3em3z.gb1.brightbox.com calico-kube-controllers-86bd75c99-q5h75 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali32ade25fe18 [] []}} ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.526 [INFO][3736] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.591 [INFO][3758] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" HandleID="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.602 [INFO][3758] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" HandleID="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318bc0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-3em3z.gb1.brightbox.com", "pod":"calico-kube-controllers-86bd75c99-q5h75", "timestamp":"2024-12-13 06:23:39.591314277 +0000 UTC"}, Hostname:"srv-3em3z.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.602 [INFO][3758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.602 [INFO][3758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.602 [INFO][3758] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3em3z.gb1.brightbox.com' Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.604 [INFO][3758] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.614 [INFO][3758] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.619 [INFO][3758] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.621 [INFO][3758] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.623 [INFO][3758] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.624 [INFO][3758] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.628 [INFO][3758] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935 Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.636 [INFO][3758] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.644 [INFO][3758] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.195/26] block=192.168.101.192/26 handle="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.644 [INFO][3758] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.195/26] handle="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.644 [INFO][3758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:39.674432 env[1185]: 2024-12-13 06:23:39.644 [INFO][3758] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.195/26] IPv6=[] ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" HandleID="k8s-pod-network.1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.675950 env[1185]: 2024-12-13 06:23:39.647 [INFO][3736] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0", GenerateName:"calico-kube-controllers-86bd75c99-", Namespace:"calico-system", SelfLink:"", UID:"76237571-200e-49e8-8fb8-8cf5bae35e01", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bd75c99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-86bd75c99-q5h75", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32ade25fe18", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:39.675950 env[1185]: 2024-12-13 06:23:39.648 [INFO][3736] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.195/32] ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.675950 env[1185]: 2024-12-13 06:23:39.648 [INFO][3736] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali32ade25fe18 ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.675950 env[1185]: 2024-12-13 06:23:39.655 [INFO][3736] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.675950 env[1185]: 2024-12-13 06:23:39.655 [INFO][3736] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0", GenerateName:"calico-kube-controllers-86bd75c99-", Namespace:"calico-system", SelfLink:"", UID:"76237571-200e-49e8-8fb8-8cf5bae35e01", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bd75c99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935", Pod:"calico-kube-controllers-86bd75c99-q5h75", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32ade25fe18", MAC:"9e:34:c9:47:15:b6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:39.675950 env[1185]: 2024-12-13 06:23:39.671 [INFO][3736] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935" Namespace="calico-system" Pod="calico-kube-controllers-86bd75c99-q5h75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:39.698000 audit[3792]: NETFILTER_CFG table=filter:107 family=2 entries=48 op=nft_register_chain pid=3792 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:39.698000 audit[3792]: SYSCALL arch=c000003e syscall=46 success=yes exit=24376 a0=3 a1=7ffe8f391150 a2=0 a3=7ffe8f39113c items=0 ppid=3195 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.698000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:39.709756 env[1185]: time="2024-12-13T06:23:39.703039451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:39.709756 env[1185]: time="2024-12-13T06:23:39.703105827Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:39.709756 env[1185]: time="2024-12-13T06:23:39.703128854Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:39.709756 env[1185]: time="2024-12-13T06:23:39.703299490Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935 pid=3793 runtime=io.containerd.runc.v2 Dec 13 06:23:39.720384 systemd[1]: Started cri-containerd-1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935.scope. Dec 13 06:23:39.728115 systemd[1]: run-containerd-runc-k8s.io-1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935-runc.NYtZc5.mount: Deactivated successfully. Dec 13 06:23:39.751232 systemd-networkd[1029]: cali31f1933e528: Link UP Dec 13 06:23:39.753730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali31f1933e528: link becomes ready Dec 13 06:23:39.754580 systemd-networkd[1029]: cali31f1933e528: Gained carrier Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.564 [INFO][3752] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0 coredns-76f75df574- kube-system cebca8c8-2276-4431-ac1a-60136909835c 822 0 2024-12-13 06:23:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-3em3z.gb1.brightbox.com coredns-76f75df574-htghs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali31f1933e528 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.564 [INFO][3752] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.605 [INFO][3764] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" HandleID="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.617 [INFO][3764] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" HandleID="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004cccb0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-3em3z.gb1.brightbox.com", "pod":"coredns-76f75df574-htghs", "timestamp":"2024-12-13 06:23:39.605344074 +0000 UTC"}, Hostname:"srv-3em3z.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.617 [INFO][3764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.645 [INFO][3764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.646 [INFO][3764] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3em3z.gb1.brightbox.com' Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.651 [INFO][3764] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.677 [INFO][3764] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.684 [INFO][3764] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.687 [INFO][3764] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.690 [INFO][3764] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.690 [INFO][3764] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.694 [INFO][3764] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850 Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.701 [INFO][3764] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.727 [INFO][3764] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.196/26] block=192.168.101.192/26 handle="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.727 [INFO][3764] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.196/26] handle="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.727 [INFO][3764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:39.786804 env[1185]: 2024-12-13 06:23:39.727 [INFO][3764] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.196/26] IPv6=[] ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" HandleID="k8s-pod-network.4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.787661 env[1185]: 2024-12-13 06:23:39.732 [INFO][3752] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cebca8c8-2276-4431-ac1a-60136909835c", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-htghs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali31f1933e528", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:39.787661 env[1185]: 2024-12-13 06:23:39.732 [INFO][3752] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.196/32] ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.787661 env[1185]: 2024-12-13 06:23:39.732 [INFO][3752] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali31f1933e528 ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.787661 env[1185]: 2024-12-13 06:23:39.758 [INFO][3752] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.787661 env[1185]: 2024-12-13 06:23:39.760 [INFO][3752] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cebca8c8-2276-4431-ac1a-60136909835c", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850", Pod:"coredns-76f75df574-htghs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali31f1933e528", MAC:"1e:3e:ad:be:55:1e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:39.787661 env[1185]: 2024-12-13 06:23:39.785 [INFO][3752] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850" Namespace="kube-system" Pod="coredns-76f75df574-htghs" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.789000 audit: BPF prog-id=170 op=LOAD Dec 13 06:23:39.792000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.792000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633661353834383430333832303733363236653265366564663738 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633661353834383430333832303733363236653265366564663738 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit: BPF prog-id=171 op=LOAD Dec 13 06:23:39.796000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b6570 items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633661353834383430333832303733363236653265366564663738 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.796000 audit: BPF prog-id=172 op=LOAD Dec 13 06:23:39.796000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b65b8 items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633661353834383430333832303733363236653265366564663738 Dec 13 06:23:39.799000 audit: BPF prog-id=172 op=UNLOAD Dec 13 06:23:39.799000 audit: BPF prog-id=171 op=UNLOAD Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.799000 audit: BPF prog-id=173 op=LOAD Dec 13 06:23:39.799000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b69c8 items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164633661353834383430333832303733363236653265366564663738 Dec 13 06:23:39.811000 audit[3827]: NETFILTER_CFG table=filter:108 family=2 entries=34 op=nft_register_chain pid=3827 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:39.811000 audit[3827]: SYSCALL arch=c000003e syscall=46 success=yes exit=18240 a0=3 a1=7fff39adafd0 a2=0 a3=7fff39adafbc items=0 ppid=3195 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.811000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:39.826480 env[1185]: time="2024-12-13T06:23:39.826412722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:39.826642 env[1185]: time="2024-12-13T06:23:39.826455022Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:39.826749 env[1185]: time="2024-12-13T06:23:39.826630285Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:39.826986 env[1185]: time="2024-12-13T06:23:39.826951272Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850 pid=3839 runtime=io.containerd.runc.v2 Dec 13 06:23:39.847095 systemd[1]: Started cri-containerd-4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850.scope. Dec 13 06:23:39.865341 env[1185]: time="2024-12-13T06:23:39.864064699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bd75c99-q5h75,Uid:76237571-200e-49e8-8fb8-8cf5bae35e01,Namespace:calico-system,Attempt:1,} returns sandbox id \"1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935\"" Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit: BPF prog-id=174 op=LOAD Dec 13 06:23:39.876000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.876000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3839 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616161326630626436356365653764626663333865306230343130 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3839 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616161326630626436356365653764626663333865306230343130 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit: BPF prog-id=175 op=LOAD Dec 13 06:23:39.877000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00034bce0 items=0 ppid=3839 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616161326630626436356365653764626663333865306230343130 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit: BPF prog-id=176 op=LOAD Dec 13 06:23:39.877000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00034bd28 items=0 ppid=3839 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616161326630626436356365653764626663333865306230343130 Dec 13 06:23:39.877000 audit: BPF prog-id=176 op=UNLOAD Dec 13 06:23:39.877000 audit: BPF prog-id=175 op=UNLOAD Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:39.877000 audit: BPF prog-id=177 op=LOAD Dec 13 06:23:39.877000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ce138 items=0 ppid=3839 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466616161326630626436356365653764626663333865306230343130 Dec 13 06:23:39.915954 env[1185]: time="2024-12-13T06:23:39.915841484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-htghs,Uid:cebca8c8-2276-4431-ac1a-60136909835c,Namespace:kube-system,Attempt:1,} returns sandbox id \"4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850\"" Dec 13 06:23:39.927098 env[1185]: time="2024-12-13T06:23:39.927024517Z" level=info msg="CreateContainer within sandbox \"4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 06:23:39.941076 env[1185]: time="2024-12-13T06:23:39.940785610Z" level=info msg="CreateContainer within sandbox \"4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"68d386f039b1a85cb6f19433505050590bd8ade944428335f8d2e352bd62e15c\"" Dec 13 06:23:39.946518 env[1185]: time="2024-12-13T06:23:39.946429041Z" level=info msg="StartContainer for \"68d386f039b1a85cb6f19433505050590bd8ade944428335f8d2e352bd62e15c\"" Dec 13 06:23:39.983591 systemd[1]: Started cri-containerd-68d386f039b1a85cb6f19433505050590bd8ade944428335f8d2e352bd62e15c.scope. Dec 13 06:23:39.999124 systemd-networkd[1029]: cali6b4fe2c9071: Gained IPv6LL Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.016000 audit: BPF prog-id=178 op=LOAD Dec 13 06:23:40.017000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.017000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3839 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643338366630333962316138356362366631393433333530353035 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3839 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643338366630333962316138356362366631393433333530353035 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit: BPF prog-id=179 op=LOAD Dec 13 06:23:40.018000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002915a0 items=0 ppid=3839 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643338366630333962316138356362366631393433333530353035 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit: BPF prog-id=180 op=LOAD Dec 13 06:23:40.018000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002915e8 items=0 ppid=3839 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643338366630333962316138356362366631393433333530353035 Dec 13 06:23:40.018000 audit: BPF prog-id=180 op=UNLOAD Dec 13 06:23:40.018000 audit: BPF prog-id=179 op=UNLOAD Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.018000 audit: BPF prog-id=181 op=LOAD Dec 13 06:23:40.018000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002919f8 items=0 ppid=3839 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643338366630333962316138356362366631393433333530353035 Dec 13 06:23:40.050966 env[1185]: time="2024-12-13T06:23:40.050906082Z" level=info msg="StartContainer for \"68d386f039b1a85cb6f19433505050590bd8ade944428335f8d2e352bd62e15c\" returns successfully" Dec 13 06:23:40.235119 env[1185]: time="2024-12-13T06:23:40.234185325Z" level=info msg="StopPodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\"" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.379 [INFO][3932] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.380 [INFO][3932] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" iface="eth0" netns="/var/run/netns/cni-1fa70d0e-b8ff-a2a9-0738-b399420097da" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.380 [INFO][3932] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" iface="eth0" netns="/var/run/netns/cni-1fa70d0e-b8ff-a2a9-0738-b399420097da" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.380 [INFO][3932] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" iface="eth0" netns="/var/run/netns/cni-1fa70d0e-b8ff-a2a9-0738-b399420097da" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.380 [INFO][3932] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.380 [INFO][3932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.433 [INFO][3938] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.434 [INFO][3938] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.434 [INFO][3938] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.441 [WARNING][3938] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.441 [INFO][3938] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.442 [INFO][3938] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:40.447229 env[1185]: 2024-12-13 06:23:40.445 [INFO][3932] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:40.448159 env[1185]: time="2024-12-13T06:23:40.447610460Z" level=info msg="TearDown network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" successfully" Dec 13 06:23:40.448159 env[1185]: time="2024-12-13T06:23:40.447659987Z" level=info msg="StopPodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" returns successfully" Dec 13 06:23:40.448562 env[1185]: time="2024-12-13T06:23:40.448528384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-dcngk,Uid:2566e160-4771-4e18-b20b-c749e8b20e8a,Namespace:calico-apiserver,Attempt:1,}" Dec 13 06:23:40.522871 systemd[1]: run-netns-cni\x2d1fa70d0e\x2db8ff\x2da2a9\x2d0738\x2db399420097da.mount: Deactivated successfully. Dec 13 06:23:40.582309 kubelet[2066]: I1213 06:23:40.582267 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-htghs" podStartSLOduration=40.5821507 podStartE2EDuration="40.5821507s" podCreationTimestamp="2024-12-13 06:23:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 06:23:40.559538682 +0000 UTC m=+52.587163314" watchObservedRunningTime="2024-12-13 06:23:40.5821507 +0000 UTC m=+52.609775342" Dec 13 06:23:40.618000 audit[3962]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:40.618000 audit[3962]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcd7c601a0 a2=0 a3=7ffcd7c6018c items=0 ppid=2243 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:40.623000 audit[3962]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:40.623000 audit[3962]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcd7c601a0 a2=0 a3=7ffcd7c6018c items=0 ppid=2243 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:40.638000 audit[3965]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=3965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:40.638000 audit[3965]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffce74d5f60 a2=0 a3=7ffce74d5f4c items=0 ppid=2243 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:40.672000 audit[3965]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:40.672000 audit[3965]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffce74d5f60 a2=0 a3=7ffce74d5f4c items=0 ppid=2243 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:40.700572 systemd-networkd[1029]: calie922c695ef8: Link UP Dec 13 06:23:40.704966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 06:23:40.705263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie922c695ef8: link becomes ready Dec 13 06:23:40.706791 systemd-networkd[1029]: calie922c695ef8: Gained carrier Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.529 [INFO][3944] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0 calico-apiserver-75fd9c9ddf- calico-apiserver 2566e160-4771-4e18-b20b-c749e8b20e8a 836 0 2024-12-13 06:23:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75fd9c9ddf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-3em3z.gb1.brightbox.com calico-apiserver-75fd9c9ddf-dcngk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie922c695ef8 [] []}} ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.529 [INFO][3944] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.623 [INFO][3956] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" HandleID="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.632 [INFO][3956] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" HandleID="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003118c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-3em3z.gb1.brightbox.com", "pod":"calico-apiserver-75fd9c9ddf-dcngk", "timestamp":"2024-12-13 06:23:40.623397199 +0000 UTC"}, Hostname:"srv-3em3z.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.632 [INFO][3956] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.633 [INFO][3956] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.633 [INFO][3956] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3em3z.gb1.brightbox.com' Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.635 [INFO][3956] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.641 [INFO][3956] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.656 [INFO][3956] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.658 [INFO][3956] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.662 [INFO][3956] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.662 [INFO][3956] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.664 [INFO][3956] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.682 [INFO][3956] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.692 [INFO][3956] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.197/26] block=192.168.101.192/26 handle="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.692 [INFO][3956] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.197/26] handle="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.692 [INFO][3956] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:40.718305 env[1185]: 2024-12-13 06:23:40.692 [INFO][3956] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.197/26] IPv6=[] ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" HandleID="k8s-pod-network.c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.719545 env[1185]: 2024-12-13 06:23:40.694 [INFO][3944] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2566e160-4771-4e18-b20b-c749e8b20e8a", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-75fd9c9ddf-dcngk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie922c695ef8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:40.719545 env[1185]: 2024-12-13 06:23:40.696 [INFO][3944] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.197/32] ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.719545 env[1185]: 2024-12-13 06:23:40.696 [INFO][3944] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie922c695ef8 ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.719545 env[1185]: 2024-12-13 06:23:40.705 [INFO][3944] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.719545 env[1185]: 2024-12-13 06:23:40.705 [INFO][3944] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2566e160-4771-4e18-b20b-c749e8b20e8a", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca", Pod:"calico-apiserver-75fd9c9ddf-dcngk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie922c695ef8", MAC:"8e:b9:ed:79:15:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:40.719545 env[1185]: 2024-12-13 06:23:40.715 [INFO][3944] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca" Namespace="calico-apiserver" Pod="calico-apiserver-75fd9c9ddf-dcngk" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:40.756687 env[1185]: time="2024-12-13T06:23:40.756613952Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:40.756687 env[1185]: time="2024-12-13T06:23:40.756655007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:40.756950 env[1185]: time="2024-12-13T06:23:40.756667175Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:40.757165 env[1185]: time="2024-12-13T06:23:40.757124496Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca pid=3985 runtime=io.containerd.runc.v2 Dec 13 06:23:40.803237 systemd[1]: run-containerd-runc-k8s.io-c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca-runc.KyZPQE.mount: Deactivated successfully. Dec 13 06:23:40.806000 audit[4004]: NETFILTER_CFG table=filter:113 family=2 entries=38 op=nft_register_chain pid=4004 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:40.806000 audit[4004]: SYSCALL arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7ffc9621d520 a2=0 a3=7ffc9621d50c items=0 ppid=3195 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.806000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:40.813556 systemd[1]: Started cri-containerd-c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca.scope. Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.838000 audit: BPF prog-id=182 op=LOAD Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3985 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366466303031373537303233366630383133376535613464373634 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3985 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366466303031373537303233366630383133376535613464373634 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.840000 audit: BPF prog-id=183 op=LOAD Dec 13 06:23:40.840000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000220d90 items=0 ppid=3985 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366466303031373537303233366630383133376535613464373634 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.841000 audit: BPF prog-id=184 op=LOAD Dec 13 06:23:40.841000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000220dd8 items=0 ppid=3985 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366466303031373537303233366630383133376535613464373634 Dec 13 06:23:40.842000 audit: BPF prog-id=184 op=UNLOAD Dec 13 06:23:40.842000 audit: BPF prog-id=183 op=UNLOAD Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:40.842000 audit: BPF prog-id=185 op=LOAD Dec 13 06:23:40.842000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002211e8 items=0 ppid=3985 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:40.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366466303031373537303233366630383133376535613464373634 Dec 13 06:23:40.880981 env[1185]: time="2024-12-13T06:23:40.880936870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fd9c9ddf-dcngk,Uid:2566e160-4771-4e18-b20b-c749e8b20e8a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca\"" Dec 13 06:23:40.979982 systemd-networkd[1029]: cali32ade25fe18: Gained IPv6LL Dec 13 06:23:41.224532 env[1185]: time="2024-12-13T06:23:41.224109097Z" level=info msg="StopPodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\"" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.307 [INFO][4042] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.308 [INFO][4042] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" iface="eth0" netns="/var/run/netns/cni-7cc163ab-a1ae-4da3-b085-96fbe3928623" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.308 [INFO][4042] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" iface="eth0" netns="/var/run/netns/cni-7cc163ab-a1ae-4da3-b085-96fbe3928623" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.308 [INFO][4042] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" iface="eth0" netns="/var/run/netns/cni-7cc163ab-a1ae-4da3-b085-96fbe3928623" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.308 [INFO][4042] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.308 [INFO][4042] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.358 [INFO][4048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.358 [INFO][4048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.358 [INFO][4048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.368 [WARNING][4048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.368 [INFO][4048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.372 [INFO][4048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:41.377922 env[1185]: 2024-12-13 06:23:41.375 [INFO][4042] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:41.379169 env[1185]: time="2024-12-13T06:23:41.379111791Z" level=info msg="TearDown network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" successfully" Dec 13 06:23:41.379318 env[1185]: time="2024-12-13T06:23:41.379292520Z" level=info msg="StopPodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" returns successfully" Dec 13 06:23:41.380587 env[1185]: time="2024-12-13T06:23:41.380550808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh75,Uid:0a2d5a25-886a-4c35-a2cc-9586bc77694e,Namespace:calico-system,Attempt:1,}" Dec 13 06:23:41.406761 systemd-networkd[1029]: cali31f1933e528: Gained IPv6LL Dec 13 06:23:41.521675 systemd[1]: run-netns-cni\x2d7cc163ab\x2da1ae\x2d4da3\x2db085\x2d96fbe3928623.mount: Deactivated successfully. Dec 13 06:23:41.619952 systemd-networkd[1029]: cali37e2bf77a8d: Link UP Dec 13 06:23:41.625278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali37e2bf77a8d: link becomes ready Dec 13 06:23:41.624786 systemd-networkd[1029]: cali37e2bf77a8d: Gained carrier Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.463 [INFO][4054] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0 csi-node-driver- calico-system 0a2d5a25-886a-4c35-a2cc-9586bc77694e 852 0 2024-12-13 06:23:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-3em3z.gb1.brightbox.com csi-node-driver-drh75 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali37e2bf77a8d [] []}} ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.464 [INFO][4054] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.564 [INFO][4066] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" HandleID="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.576 [INFO][4066] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" HandleID="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003932c0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-3em3z.gb1.brightbox.com", "pod":"csi-node-driver-drh75", "timestamp":"2024-12-13 06:23:41.564608794 +0000 UTC"}, Hostname:"srv-3em3z.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.576 [INFO][4066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.576 [INFO][4066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.576 [INFO][4066] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-3em3z.gb1.brightbox.com' Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.578 [INFO][4066] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.583 [INFO][4066] ipam/ipam.go 372: Looking up existing affinities for host host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.588 [INFO][4066] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.590 [INFO][4066] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.593 [INFO][4066] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.593 [INFO][4066] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.595 [INFO][4066] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87 Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.601 [INFO][4066] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.612 [INFO][4066] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.198/26] block=192.168.101.192/26 handle="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.612 [INFO][4066] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.198/26] handle="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" host="srv-3em3z.gb1.brightbox.com" Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.612 [INFO][4066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:41.657679 env[1185]: 2024-12-13 06:23:41.612 [INFO][4066] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.198/26] IPv6=[] ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" HandleID="k8s-pod-network.971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.659075 env[1185]: 2024-12-13 06:23:41.616 [INFO][4054] cni-plugin/k8s.go 386: Populated endpoint ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a2d5a25-886a-4c35-a2cc-9586bc77694e", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-drh75", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali37e2bf77a8d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:41.659075 env[1185]: 2024-12-13 06:23:41.616 [INFO][4054] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.198/32] ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.659075 env[1185]: 2024-12-13 06:23:41.616 [INFO][4054] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali37e2bf77a8d ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.659075 env[1185]: 2024-12-13 06:23:41.627 [INFO][4054] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.659075 env[1185]: 2024-12-13 06:23:41.632 [INFO][4054] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a2d5a25-886a-4c35-a2cc-9586bc77694e", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87", Pod:"csi-node-driver-drh75", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali37e2bf77a8d", MAC:"3a:3f:ed:bf:ee:49", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:41.659075 env[1185]: 2024-12-13 06:23:41.655 [INFO][4054] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87" Namespace="calico-system" Pod="csi-node-driver-drh75" WorkloadEndpoint="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:41.675000 audit[4081]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4081 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 06:23:41.675000 audit[4081]: SYSCALL arch=c000003e syscall=46 success=yes exit=21040 a0=3 a1=7ffc586ab880 a2=0 a3=7ffc586ab86c items=0 ppid=3195 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:41.675000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 06:23:41.693454 env[1185]: time="2024-12-13T06:23:41.693394031Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 06:23:41.693597 env[1185]: time="2024-12-13T06:23:41.693438174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 06:23:41.693597 env[1185]: time="2024-12-13T06:23:41.693448675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 06:23:41.693597 env[1185]: time="2024-12-13T06:23:41.693571025Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87 pid=4092 runtime=io.containerd.runc.v2 Dec 13 06:23:41.717787 systemd[1]: Started cri-containerd-971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87.scope. Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.755000 audit: BPF prog-id=186 op=LOAD Dec 13 06:23:41.756000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.756000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4092 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:41.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937316539353039303132653439366364313165643662396432366636 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4092 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:41.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937316539353039303132653439366364313165643662396432366636 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.757000 audit: BPF prog-id=187 op=LOAD Dec 13 06:23:41.757000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288660 items=0 ppid=4092 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:41.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937316539353039303132653439366364313165643662396432366636 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit: BPF prog-id=188 op=LOAD Dec 13 06:23:41.758000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002886a8 items=0 ppid=4092 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:41.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937316539353039303132653439366364313165643662396432366636 Dec 13 06:23:41.758000 audit: BPF prog-id=188 op=UNLOAD Dec 13 06:23:41.758000 audit: BPF prog-id=187 op=UNLOAD Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:41.758000 audit: BPF prog-id=189 op=LOAD Dec 13 06:23:41.758000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000288ab8 items=0 ppid=4092 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:41.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937316539353039303132653439366364313165643662396432366636 Dec 13 06:23:41.785843 env[1185]: time="2024-12-13T06:23:41.785782406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-drh75,Uid:0a2d5a25-886a-4c35-a2cc-9586bc77694e,Namespace:calico-system,Attempt:1,} returns sandbox id \"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87\"" Dec 13 06:23:42.184931 env[1185]: time="2024-12-13T06:23:42.184845050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:42.187590 env[1185]: time="2024-12-13T06:23:42.187551255Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:42.188632 env[1185]: time="2024-12-13T06:23:42.188587128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 06:23:42.191679 env[1185]: time="2024-12-13T06:23:42.190945937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:42.191679 env[1185]: time="2024-12-13T06:23:42.191454592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:42.192423 env[1185]: time="2024-12-13T06:23:42.192399906Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 06:23:42.193532 env[1185]: time="2024-12-13T06:23:42.193475339Z" level=info msg="CreateContainer within sandbox \"05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 06:23:42.203752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount839435062.mount: Deactivated successfully. Dec 13 06:23:42.214299 env[1185]: time="2024-12-13T06:23:42.214227688Z" level=info msg="CreateContainer within sandbox \"05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"11dd382eb877c7ae52e57b7a6501436040af650b1984c34873704f69fcee83be\"" Dec 13 06:23:42.218757 env[1185]: time="2024-12-13T06:23:42.216910466Z" level=info msg="StartContainer for \"11dd382eb877c7ae52e57b7a6501436040af650b1984c34873704f69fcee83be\"" Dec 13 06:23:42.239797 systemd-networkd[1029]: calie922c695ef8: Gained IPv6LL Dec 13 06:23:42.283440 systemd[1]: Started cri-containerd-11dd382eb877c7ae52e57b7a6501436040af650b1984c34873704f69fcee83be.scope. Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.325000 audit: BPF prog-id=190 op=LOAD Dec 13 06:23:42.329000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.329000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3642 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131646433383265623837376337616535326535376237613635303134 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3642 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131646433383265623837376337616535326535376237613635303134 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.330000 audit: BPF prog-id=191 op=LOAD Dec 13 06:23:42.330000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099910 items=0 ppid=3642 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131646433383265623837376337616535326535376237613635303134 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.343000 audit: BPF prog-id=192 op=LOAD Dec 13 06:23:42.343000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099958 items=0 ppid=3642 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131646433383265623837376337616535326535376237613635303134 Dec 13 06:23:42.344000 audit: BPF prog-id=192 op=UNLOAD Dec 13 06:23:42.344000 audit: BPF prog-id=191 op=UNLOAD Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:42.344000 audit: BPF prog-id=193 op=LOAD Dec 13 06:23:42.344000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099d68 items=0 ppid=3642 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131646433383265623837376337616535326535376237613635303134 Dec 13 06:23:42.398299 env[1185]: time="2024-12-13T06:23:42.398248961Z" level=info msg="StartContainer for \"11dd382eb877c7ae52e57b7a6501436040af650b1984c34873704f69fcee83be\" returns successfully" Dec 13 06:23:42.567453 kubelet[2066]: I1213 06:23:42.567422 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-29r6m" podStartSLOduration=30.097438181 podStartE2EDuration="33.567374826s" podCreationTimestamp="2024-12-13 06:23:09 +0000 UTC" firstStartedPulling="2024-12-13 06:23:38.719183367 +0000 UTC m=+50.746808001" lastFinishedPulling="2024-12-13 06:23:42.189119993 +0000 UTC m=+54.216744646" observedRunningTime="2024-12-13 06:23:42.565543208 +0000 UTC m=+54.593167864" watchObservedRunningTime="2024-12-13 06:23:42.567374826 +0000 UTC m=+54.594999460" Dec 13 06:23:42.615000 audit[4169]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:42.615000 audit[4169]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffde8aaaf20 a2=0 a3=7ffde8aaaf0c items=0 ppid=2243 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:42.621000 audit[4169]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:42.621000 audit[4169]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffde8aaaf20 a2=0 a3=7ffde8aaaf0c items=0 ppid=2243 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:42.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:42.750112 systemd-networkd[1029]: cali37e2bf77a8d: Gained IPv6LL Dec 13 06:23:42.805000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:42.805000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e098c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:42.805000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:42.806000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:42.806000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d0b4e0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:42.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:43.308000 audit[4150]: AVC avc: denied { watch } for pid=4150 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_06_23_24.2862229634/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c552,c768 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c552,c768 tclass=file permissive=0 Dec 13 06:23:43.308000 audit[4150]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c978c0 a2=fc6 a3=0 items=0 ppid=3642 pid=4150 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c552,c768 key=(null) Dec 13 06:23:43.308000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 06:23:43.501000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:43.501000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:43.501000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00b86bac0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:23:43.501000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007457020 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:23:43.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:23:43.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:23:43.504000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526915 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:43.504000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0076a4540 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:23:43.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:23:43.505000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526921 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:43.505000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0076a4570 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:23:43.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:23:43.556000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:43.556000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0076a4690 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:23:43.556000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:23:43.557000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:43.557000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00b86bce0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:23:43.557000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:23:43.562983 kubelet[2066]: I1213 06:23:43.562895 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 06:23:46.692882 env[1185]: time="2024-12-13T06:23:46.692818226Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:46.695191 env[1185]: time="2024-12-13T06:23:46.695161923Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:46.697019 env[1185]: time="2024-12-13T06:23:46.696996071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:46.699411 env[1185]: time="2024-12-13T06:23:46.699362226Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:46.709951 env[1185]: time="2024-12-13T06:23:46.709916103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 06:23:46.712389 env[1185]: time="2024-12-13T06:23:46.712359513Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 06:23:46.740107 env[1185]: time="2024-12-13T06:23:46.740061774Z" level=info msg="CreateContainer within sandbox \"1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 06:23:46.750972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1622739513.mount: Deactivated successfully. Dec 13 06:23:46.763336 env[1185]: time="2024-12-13T06:23:46.763305433Z" level=info msg="CreateContainer within sandbox \"1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2\"" Dec 13 06:23:46.765380 env[1185]: time="2024-12-13T06:23:46.764684330Z" level=info msg="StartContainer for \"3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2\"" Dec 13 06:23:46.799493 systemd[1]: Started cri-containerd-3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2.scope. Dec 13 06:23:46.836477 kernel: kauditd_printk_skb: 461 callbacks suppressed Dec 13 06:23:46.839273 kernel: audit: type=1400 audit(1734071026.831:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.839339 kernel: audit: type=1400 audit(1734071026.831:1293): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.842204 kernel: audit: type=1400 audit(1734071026.831:1294): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.844887 kernel: audit: type=1400 audit(1734071026.831:1295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.847807 kernel: audit: type=1400 audit(1734071026.831:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.848107 kernel: audit: type=1400 audit(1734071026.831:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.853753 kernel: audit: type=1400 audit(1734071026.831:1298): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.856584 kernel: audit: type=1400 audit(1734071026.831:1299): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.862185 kernel: audit: type=1400 audit(1734071026.831:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.862254 kernel: audit: type=1400 audit(1734071026.832:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.832000 audit: BPF prog-id=194 op=LOAD Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3793 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:46.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373836343832343238393365346565313839323238326462383266 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3793 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:46.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373836343832343238393365346565313839323238326462383266 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.836000 audit: BPF prog-id=195 op=LOAD Dec 13 06:23:46.836000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d4e90 items=0 ppid=3793 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:46.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373836343832343238393365346565313839323238326462383266 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit: BPF prog-id=196 op=LOAD Dec 13 06:23:46.838000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d4ed8 items=0 ppid=3793 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:46.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373836343832343238393365346565313839323238326462383266 Dec 13 06:23:46.838000 audit: BPF prog-id=196 op=UNLOAD Dec 13 06:23:46.838000 audit: BPF prog-id=195 op=UNLOAD Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:46.838000 audit: BPF prog-id=197 op=LOAD Dec 13 06:23:46.838000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d52e8 items=0 ppid=3793 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:46.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361373836343832343238393365346565313839323238326462383266 Dec 13 06:23:46.901750 env[1185]: time="2024-12-13T06:23:46.900124296Z" level=info msg="StartContainer for \"3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2\" returns successfully" Dec 13 06:23:47.087076 env[1185]: time="2024-12-13T06:23:47.086957060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:47.090101 env[1185]: time="2024-12-13T06:23:47.090016913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:47.094558 env[1185]: time="2024-12-13T06:23:47.094478957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:47.098115 env[1185]: time="2024-12-13T06:23:47.098023143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:47.099760 env[1185]: time="2024-12-13T06:23:47.099471986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 06:23:47.104307 env[1185]: time="2024-12-13T06:23:47.104137560Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 06:23:47.105768 env[1185]: time="2024-12-13T06:23:47.105737918Z" level=info msg="CreateContainer within sandbox \"c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 06:23:47.126545 env[1185]: time="2024-12-13T06:23:47.126508889Z" level=info msg="CreateContainer within sandbox \"c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ba3229c309172dac21d04f69cb72418de4b95e2700dd91326734f2beabc2e200\"" Dec 13 06:23:47.127286 env[1185]: time="2024-12-13T06:23:47.127257269Z" level=info msg="StartContainer for \"ba3229c309172dac21d04f69cb72418de4b95e2700dd91326734f2beabc2e200\"" Dec 13 06:23:47.156206 systemd[1]: Started cri-containerd-ba3229c309172dac21d04f69cb72418de4b95e2700dd91326734f2beabc2e200.scope. Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit: BPF prog-id=198 op=LOAD Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3985 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333232396333303931373264616332316430346636396362373234 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3985 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333232396333303931373264616332316430346636396362373234 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.184000 audit: BPF prog-id=199 op=LOAD Dec 13 06:23:47.184000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000370610 items=0 ppid=3985 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333232396333303931373264616332316430346636396362373234 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.185000 audit: BPF prog-id=200 op=LOAD Dec 13 06:23:47.185000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000370658 items=0 ppid=3985 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333232396333303931373264616332316430346636396362373234 Dec 13 06:23:47.185000 audit: BPF prog-id=200 op=UNLOAD Dec 13 06:23:47.186000 audit: BPF prog-id=199 op=UNLOAD Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:47.187000 audit: BPF prog-id=201 op=LOAD Dec 13 06:23:47.187000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000370a68 items=0 ppid=3985 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333232396333303931373264616332316430346636396362373234 Dec 13 06:23:47.230851 env[1185]: time="2024-12-13T06:23:47.230783260Z" level=info msg="StartContainer for \"ba3229c309172dac21d04f69cb72418de4b95e2700dd91326734f2beabc2e200\" returns successfully" Dec 13 06:23:47.600941 kubelet[2066]: I1213 06:23:47.600907 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-86bd75c99-q5h75" podStartSLOduration=30.756266168 podStartE2EDuration="37.600818126s" podCreationTimestamp="2024-12-13 06:23:10 +0000 UTC" firstStartedPulling="2024-12-13 06:23:39.86587205 +0000 UTC m=+51.893496686" lastFinishedPulling="2024-12-13 06:23:46.710424012 +0000 UTC m=+58.738048644" observedRunningTime="2024-12-13 06:23:47.596555834 +0000 UTC m=+59.624180468" watchObservedRunningTime="2024-12-13 06:23:47.600818126 +0000 UTC m=+59.628442778" Dec 13 06:23:47.646000 audit[4274]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:47.646000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe9bd060f0 a2=0 a3=7ffe9bd060dc items=0 ppid=2243 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:47.649000 audit[4274]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:23:47.649000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe9bd060f0 a2=0 a3=7ffe9bd060dc items=0 ppid=2243 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:47.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:23:47.686203 kubelet[2066]: I1213 06:23:47.685941 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75fd9c9ddf-dcngk" podStartSLOduration=32.468019961 podStartE2EDuration="38.685900954s" podCreationTimestamp="2024-12-13 06:23:09 +0000 UTC" firstStartedPulling="2024-12-13 06:23:40.882619802 +0000 UTC m=+52.910244435" lastFinishedPulling="2024-12-13 06:23:47.100500747 +0000 UTC m=+59.128125428" observedRunningTime="2024-12-13 06:23:47.613232726 +0000 UTC m=+59.640857377" watchObservedRunningTime="2024-12-13 06:23:47.685900954 +0000 UTC m=+59.713525605" Dec 13 06:23:48.275130 env[1185]: time="2024-12-13T06:23:48.275016737Z" level=info msg="StopPodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\"" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.434 [WARNING][4296] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0", GenerateName:"calico-kube-controllers-86bd75c99-", Namespace:"calico-system", SelfLink:"", UID:"76237571-200e-49e8-8fb8-8cf5bae35e01", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bd75c99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935", Pod:"calico-kube-controllers-86bd75c99-q5h75", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32ade25fe18", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.435 [INFO][4296] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.435 [INFO][4296] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" iface="eth0" netns="" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.435 [INFO][4296] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.436 [INFO][4296] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.494 [INFO][4302] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.494 [INFO][4302] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.494 [INFO][4302] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.509 [WARNING][4302] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.509 [INFO][4302] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.510 [INFO][4302] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:48.516109 env[1185]: 2024-12-13 06:23:48.513 [INFO][4296] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.516937 env[1185]: time="2024-12-13T06:23:48.516147226Z" level=info msg="TearDown network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" successfully" Dec 13 06:23:48.516937 env[1185]: time="2024-12-13T06:23:48.516192340Z" level=info msg="StopPodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" returns successfully" Dec 13 06:23:48.525381 env[1185]: time="2024-12-13T06:23:48.525294222Z" level=info msg="RemovePodSandbox for \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\"" Dec 13 06:23:48.526140 env[1185]: time="2024-12-13T06:23:48.525340507Z" level=info msg="Forcibly stopping sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\"" Dec 13 06:23:48.589161 kubelet[2066]: I1213 06:23:48.588313 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.656 [WARNING][4321] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0", GenerateName:"calico-kube-controllers-86bd75c99-", Namespace:"calico-system", SelfLink:"", UID:"76237571-200e-49e8-8fb8-8cf5bae35e01", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bd75c99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"1dc6a584840382073626e2e6edf78c253c04aaba7830c65feb11a2d0bb777935", Pod:"calico-kube-controllers-86bd75c99-q5h75", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali32ade25fe18", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.657 [INFO][4321] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.657 [INFO][4321] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" iface="eth0" netns="" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.657 [INFO][4321] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.657 [INFO][4321] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.718 [INFO][4328] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.718 [INFO][4328] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.718 [INFO][4328] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.736 [WARNING][4328] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.736 [INFO][4328] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" HandleID="k8s-pod-network.055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--kube--controllers--86bd75c99--q5h75-eth0" Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.743 [INFO][4328] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:48.751789 env[1185]: 2024-12-13 06:23:48.746 [INFO][4321] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a" Dec 13 06:23:48.754902 env[1185]: time="2024-12-13T06:23:48.752844997Z" level=info msg="TearDown network for sandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" successfully" Dec 13 06:23:48.757282 env[1185]: time="2024-12-13T06:23:48.757220507Z" level=info msg="RemovePodSandbox \"055cd0e6bae44ebc5d90fa8e4373b1033b8494e83e83e8453b19033c9a08eb9a\" returns successfully" Dec 13 06:23:48.760161 env[1185]: time="2024-12-13T06:23:48.760126751Z" level=info msg="StopPodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\"" Dec 13 06:23:48.761000 audit[4236]: AVC avc: denied { watch } for pid=4236 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_06_23_24.418350835/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c827 tclass=file permissive=0 Dec 13 06:23:48.761000 audit[4236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0015c9f20 a2=fc6 a3=0 items=0 ppid=3985 pid=4236 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c827 key=(null) Dec 13 06:23:48.761000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.841 [WARNING][4346] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7e65410-005f-4da2-975b-33dd208722a6", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499", Pod:"calico-apiserver-75fd9c9ddf-29r6m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b4fe2c9071", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.841 [INFO][4346] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.841 [INFO][4346] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" iface="eth0" netns="" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.841 [INFO][4346] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.841 [INFO][4346] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.884 [INFO][4354] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.884 [INFO][4354] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.884 [INFO][4354] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.894 [WARNING][4354] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.894 [INFO][4354] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.898 [INFO][4354] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:48.904628 env[1185]: 2024-12-13 06:23:48.901 [INFO][4346] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:48.905519 env[1185]: time="2024-12-13T06:23:48.905459344Z" level=info msg="TearDown network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" successfully" Dec 13 06:23:48.905633 env[1185]: time="2024-12-13T06:23:48.905610208Z" level=info msg="StopPodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" returns successfully" Dec 13 06:23:48.906445 env[1185]: time="2024-12-13T06:23:48.906423713Z" level=info msg="RemovePodSandbox for \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\"" Dec 13 06:23:48.906573 env[1185]: time="2024-12-13T06:23:48.906536075Z" level=info msg="Forcibly stopping sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\"" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.962 [WARNING][4372] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7e65410-005f-4da2-975b-33dd208722a6", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"05ab27eb24b258acb5649cd3422aa6f7dda259551b89addf5fe1f346335b9499", Pod:"calico-apiserver-75fd9c9ddf-29r6m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b4fe2c9071", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.962 [INFO][4372] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.963 [INFO][4372] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" iface="eth0" netns="" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.963 [INFO][4372] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.963 [INFO][4372] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.998 [INFO][4378] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.999 [INFO][4378] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:48.999 [INFO][4378] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:49.005 [WARNING][4378] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:49.006 [INFO][4378] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" HandleID="k8s-pod-network.20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--29r6m-eth0" Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:49.007 [INFO][4378] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.011646 env[1185]: 2024-12-13 06:23:49.010 [INFO][4372] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4" Dec 13 06:23:49.012571 env[1185]: time="2024-12-13T06:23:49.011684461Z" level=info msg="TearDown network for sandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" successfully" Dec 13 06:23:49.014776 env[1185]: time="2024-12-13T06:23:49.014743483Z" level=info msg="RemovePodSandbox \"20730d47d8b37ba838c73dfc0c17a7a3701bf5a1008d6ee2b4cee9aec63bd6d4\" returns successfully" Dec 13 06:23:49.015365 env[1185]: time="2024-12-13T06:23:49.015342391Z" level=info msg="StopPodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\"" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.106 [WARNING][4397] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cebca8c8-2276-4431-ac1a-60136909835c", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850", Pod:"coredns-76f75df574-htghs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali31f1933e528", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.107 [INFO][4397] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.107 [INFO][4397] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" iface="eth0" netns="" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.107 [INFO][4397] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.107 [INFO][4397] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.142 [INFO][4403] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.142 [INFO][4403] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.142 [INFO][4403] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.150 [WARNING][4403] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.150 [INFO][4403] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.154 [INFO][4403] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.160919 env[1185]: 2024-12-13 06:23:49.156 [INFO][4397] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.162021 env[1185]: time="2024-12-13T06:23:49.161148434Z" level=info msg="TearDown network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" successfully" Dec 13 06:23:49.162021 env[1185]: time="2024-12-13T06:23:49.161197001Z" level=info msg="StopPodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" returns successfully" Dec 13 06:23:49.162509 env[1185]: time="2024-12-13T06:23:49.162483975Z" level=info msg="RemovePodSandbox for \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\"" Dec 13 06:23:49.162731 env[1185]: time="2024-12-13T06:23:49.162677606Z" level=info msg="Forcibly stopping sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\"" Dec 13 06:23:49.253142 env[1185]: time="2024-12-13T06:23:49.253083693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:49.254679 env[1185]: time="2024-12-13T06:23:49.254649232Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:49.260792 env[1185]: time="2024-12-13T06:23:49.260651544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:49.263192 env[1185]: time="2024-12-13T06:23:49.263148201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:49.263747 env[1185]: time="2024-12-13T06:23:49.263660083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 06:23:49.270517 env[1185]: time="2024-12-13T06:23:49.270129584Z" level=info msg="CreateContainer within sandbox \"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 06:23:49.285873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2309056049.mount: Deactivated successfully. Dec 13 06:23:49.295155 env[1185]: time="2024-12-13T06:23:49.295101828Z" level=info msg="CreateContainer within sandbox \"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4cdff3f393a118ab74e748ccc112509797bca2116c40e1dc1ef23b70b8c427e2\"" Dec 13 06:23:49.297459 env[1185]: time="2024-12-13T06:23:49.296517913Z" level=info msg="StartContainer for \"4cdff3f393a118ab74e748ccc112509797bca2116c40e1dc1ef23b70b8c427e2\"" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.262 [WARNING][4424] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cebca8c8-2276-4431-ac1a-60136909835c", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"4faaa2f0bd65cee7dbfc38e0b04102e8690909ce896f8465c607e09674d6f850", Pod:"coredns-76f75df574-htghs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali31f1933e528", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.262 [INFO][4424] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.262 [INFO][4424] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" iface="eth0" netns="" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.262 [INFO][4424] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.262 [INFO][4424] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.330 [INFO][4430] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.330 [INFO][4430] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.330 [INFO][4430] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.343 [WARNING][4430] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.343 [INFO][4430] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" HandleID="k8s-pod-network.1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--htghs-eth0" Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.346 [INFO][4430] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.361862 env[1185]: 2024-12-13 06:23:49.360 [INFO][4424] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266" Dec 13 06:23:49.362577 env[1185]: time="2024-12-13T06:23:49.362536930Z" level=info msg="TearDown network for sandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" successfully" Dec 13 06:23:49.365774 env[1185]: time="2024-12-13T06:23:49.365696521Z" level=info msg="RemovePodSandbox \"1388671c48885b5089af6c47060367bc8473ba211aa16ddd8555f460cdd22266\" returns successfully" Dec 13 06:23:49.366531 systemd[1]: Started cri-containerd-4cdff3f393a118ab74e748ccc112509797bca2116c40e1dc1ef23b70b8c427e2.scope. Dec 13 06:23:49.369510 env[1185]: time="2024-12-13T06:23:49.369485852Z" level=info msg="StopPodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\"" Dec 13 06:23:49.388000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.388000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6d5c6ca718 items=0 ppid=4092 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:49.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463646666336633393361313138616237346537343863636331313235 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit: BPF prog-id=202 op=LOAD Dec 13 06:23:49.389000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000210d78 items=0 ppid=4092 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:49.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463646666336633393361313138616237346537343863636331313235 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit: BPF prog-id=203 op=LOAD Dec 13 06:23:49.389000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000210dc8 items=0 ppid=4092 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:49.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463646666336633393361313138616237346537343863636331313235 Dec 13 06:23:49.389000 audit: BPF prog-id=203 op=UNLOAD Dec 13 06:23:49.389000 audit: BPF prog-id=202 op=UNLOAD Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:49.389000 audit: BPF prog-id=204 op=LOAD Dec 13 06:23:49.389000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000210e58 items=0 ppid=4092 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:49.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463646666336633393361313138616237346537343863636331313235 Dec 13 06:23:49.423146 env[1185]: time="2024-12-13T06:23:49.423044056Z" level=info msg="StartContainer for \"4cdff3f393a118ab74e748ccc112509797bca2116c40e1dc1ef23b70b8c427e2\" returns successfully" Dec 13 06:23:49.427514 env[1185]: time="2024-12-13T06:23:49.427476010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.468 [WARNING][4477] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a2d5a25-886a-4c35-a2cc-9586bc77694e", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87", Pod:"csi-node-driver-drh75", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali37e2bf77a8d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.468 [INFO][4477] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.468 [INFO][4477] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" iface="eth0" netns="" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.468 [INFO][4477] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.468 [INFO][4477] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.522 [INFO][4491] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.522 [INFO][4491] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.522 [INFO][4491] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.532 [WARNING][4491] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.532 [INFO][4491] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.534 [INFO][4491] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.538098 env[1185]: 2024-12-13 06:23:49.536 [INFO][4477] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.538861 env[1185]: time="2024-12-13T06:23:49.538163844Z" level=info msg="TearDown network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" successfully" Dec 13 06:23:49.538861 env[1185]: time="2024-12-13T06:23:49.538200023Z" level=info msg="StopPodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" returns successfully" Dec 13 06:23:49.539550 env[1185]: time="2024-12-13T06:23:49.539517323Z" level=info msg="RemovePodSandbox for \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\"" Dec 13 06:23:49.539647 env[1185]: time="2024-12-13T06:23:49.539562216Z" level=info msg="Forcibly stopping sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\"" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.591 [WARNING][4511] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a2d5a25-886a-4c35-a2cc-9586bc77694e", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87", Pod:"csi-node-driver-drh75", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali37e2bf77a8d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.592 [INFO][4511] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.592 [INFO][4511] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" iface="eth0" netns="" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.592 [INFO][4511] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.592 [INFO][4511] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.625 [INFO][4517] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.625 [INFO][4517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.625 [INFO][4517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.632 [WARNING][4517] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.632 [INFO][4517] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" HandleID="k8s-pod-network.e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Workload="srv--3em3z.gb1.brightbox.com-k8s-csi--node--driver--drh75-eth0" Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.634 [INFO][4517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.640355 env[1185]: 2024-12-13 06:23:49.637 [INFO][4511] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926" Dec 13 06:23:49.642007 env[1185]: time="2024-12-13T06:23:49.641959554Z" level=info msg="TearDown network for sandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" successfully" Dec 13 06:23:49.645276 env[1185]: time="2024-12-13T06:23:49.644579676Z" level=info msg="RemovePodSandbox \"e77d189c2b56529e6d3f38de262499b41b3792c19d4726c5aef1d79fc6ba1926\" returns successfully" Dec 13 06:23:49.647206 env[1185]: time="2024-12-13T06:23:49.647027999Z" level=info msg="StopPodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\"" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.743 [WARNING][4538] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251", Pod:"coredns-76f75df574-vb29h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d3214a5daa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.743 [INFO][4538] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.743 [INFO][4538] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" iface="eth0" netns="" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.743 [INFO][4538] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.743 [INFO][4538] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.766 [INFO][4544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.767 [INFO][4544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.767 [INFO][4544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.773 [WARNING][4544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.773 [INFO][4544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.775 [INFO][4544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.779160 env[1185]: 2024-12-13 06:23:49.777 [INFO][4538] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.779726 env[1185]: time="2024-12-13T06:23:49.779187155Z" level=info msg="TearDown network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" successfully" Dec 13 06:23:49.779726 env[1185]: time="2024-12-13T06:23:49.779215253Z" level=info msg="StopPodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" returns successfully" Dec 13 06:23:49.779796 env[1185]: time="2024-12-13T06:23:49.779750151Z" level=info msg="RemovePodSandbox for \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\"" Dec 13 06:23:49.779881 env[1185]: time="2024-12-13T06:23:49.779776635Z" level=info msg="Forcibly stopping sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\"" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.818 [WARNING][4563] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ed610c70-ccfa-458e-b18e-b7a2f0ecd55c", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"403f5acaddd885946f162d29e5a55e3c009fefb3139fb32753d271e7033a3251", Pod:"coredns-76f75df574-vb29h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d3214a5daa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.818 [INFO][4563] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.818 [INFO][4563] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" iface="eth0" netns="" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.818 [INFO][4563] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.818 [INFO][4563] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.841 [INFO][4569] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.841 [INFO][4569] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.841 [INFO][4569] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.848 [WARNING][4569] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.848 [INFO][4569] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" HandleID="k8s-pod-network.5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Workload="srv--3em3z.gb1.brightbox.com-k8s-coredns--76f75df574--vb29h-eth0" Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.850 [INFO][4569] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.853249 env[1185]: 2024-12-13 06:23:49.851 [INFO][4563] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693" Dec 13 06:23:49.854679 env[1185]: time="2024-12-13T06:23:49.853278700Z" level=info msg="TearDown network for sandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" successfully" Dec 13 06:23:49.855913 env[1185]: time="2024-12-13T06:23:49.855886308Z" level=info msg="RemovePodSandbox \"5892912bd7670119b5640fdf45f9b19b2fa7d9d772ca7b2a0f334effd8d27693\" returns successfully" Dec 13 06:23:49.856390 env[1185]: time="2024-12-13T06:23:49.856366462Z" level=info msg="StopPodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\"" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.909 [WARNING][4587] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2566e160-4771-4e18-b20b-c749e8b20e8a", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca", Pod:"calico-apiserver-75fd9c9ddf-dcngk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie922c695ef8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.910 [INFO][4587] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.910 [INFO][4587] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" iface="eth0" netns="" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.910 [INFO][4587] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.910 [INFO][4587] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.942 [INFO][4594] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.942 [INFO][4594] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.942 [INFO][4594] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.950 [WARNING][4594] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.951 [INFO][4594] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.955 [INFO][4594] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:49.962635 env[1185]: 2024-12-13 06:23:49.958 [INFO][4587] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:49.965276 env[1185]: time="2024-12-13T06:23:49.962687487Z" level=info msg="TearDown network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" successfully" Dec 13 06:23:49.965276 env[1185]: time="2024-12-13T06:23:49.962845998Z" level=info msg="StopPodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" returns successfully" Dec 13 06:23:49.966076 env[1185]: time="2024-12-13T06:23:49.966014086Z" level=info msg="RemovePodSandbox for \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\"" Dec 13 06:23:49.966433 env[1185]: time="2024-12-13T06:23:49.966325862Z" level=info msg="Forcibly stopping sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\"" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.019 [WARNING][4612] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0", GenerateName:"calico-apiserver-75fd9c9ddf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2566e160-4771-4e18-b20b-c749e8b20e8a", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 6, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fd9c9ddf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-3em3z.gb1.brightbox.com", ContainerID:"c66df0017570236f08137e5a4d7649f64193412481ac41faabb920395cb8b9ca", Pod:"calico-apiserver-75fd9c9ddf-dcngk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie922c695ef8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.019 [INFO][4612] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.019 [INFO][4612] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" iface="eth0" netns="" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.019 [INFO][4612] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.019 [INFO][4612] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.040 [INFO][4618] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.040 [INFO][4618] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.040 [INFO][4618] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.049 [WARNING][4618] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.049 [INFO][4618] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" HandleID="k8s-pod-network.955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Workload="srv--3em3z.gb1.brightbox.com-k8s-calico--apiserver--75fd9c9ddf--dcngk-eth0" Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.050 [INFO][4618] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 06:23:50.054035 env[1185]: 2024-12-13 06:23:50.052 [INFO][4612] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024" Dec 13 06:23:50.056146 env[1185]: time="2024-12-13T06:23:50.054003351Z" level=info msg="TearDown network for sandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" successfully" Dec 13 06:23:50.063685 env[1185]: time="2024-12-13T06:23:50.063645151Z" level=info msg="RemovePodSandbox \"955606bd5db73b41ac2f75290eaae6205f7fc2353c2e4202af2d10b2be44d024\" returns successfully" Dec 13 06:23:50.283132 systemd[1]: run-containerd-runc-k8s.io-4cdff3f393a118ab74e748ccc112509797bca2116c40e1dc1ef23b70b8c427e2-runc.Y7Nhlr.mount: Deactivated successfully. Dec 13 06:23:52.034762 env[1185]: time="2024-12-13T06:23:52.034608875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:52.036387 env[1185]: time="2024-12-13T06:23:52.036300045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:52.038094 env[1185]: time="2024-12-13T06:23:52.038056166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:52.039899 env[1185]: time="2024-12-13T06:23:52.039861428Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 06:23:52.040180 env[1185]: time="2024-12-13T06:23:52.040153702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 06:23:52.045107 env[1185]: time="2024-12-13T06:23:52.045065727Z" level=info msg="CreateContainer within sandbox \"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 06:23:52.058251 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3509329885.mount: Deactivated successfully. Dec 13 06:23:52.062596 env[1185]: time="2024-12-13T06:23:52.062553674Z" level=info msg="CreateContainer within sandbox \"971e9509012e496cd11ed6b9d26f69c0040df5a74305a4fb3a802e658a670d87\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6bd7f5907ae87b364510be5bf93f951a551c4c7c86fcc7d46ca74df8a3bfc008\"" Dec 13 06:23:52.063321 env[1185]: time="2024-12-13T06:23:52.063297164Z" level=info msg="StartContainer for \"6bd7f5907ae87b364510be5bf93f951a551c4c7c86fcc7d46ca74df8a3bfc008\"" Dec 13 06:23:52.086678 systemd[1]: Started cri-containerd-6bd7f5907ae87b364510be5bf93f951a551c4c7c86fcc7d46ca74df8a3bfc008.scope. Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.115859 kernel: kauditd_printk_skb: 156 callbacks suppressed Dec 13 06:23:52.115954 kernel: audit: type=1400 audit(1734071032.114:1337): avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd33244c688 items=0 ppid=4092 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:52.131812 kernel: audit: type=1300 audit(1734071032.114:1337): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd33244c688 items=0 ppid=4092 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:52.131891 kernel: audit: type=1327 audit(1734071032.114:1337): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643766353930376165383762333634353130626535626639336639 Dec 13 06:23:52.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643766353930376165383762333634353130626535626639336639 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.138040 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.138106 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.143258 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.146751 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.153720 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.159263 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.159313 kernel: audit: type=1400 audit(1734071032.114:1338): avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.114000 audit: BPF prog-id=205 op=LOAD Dec 13 06:23:52.114000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000393ef8 items=0 ppid=4092 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:52.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643766353930376165383762333634353130626535626639336639 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit: BPF prog-id=206 op=LOAD Dec 13 06:23:52.126000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000393f48 items=0 ppid=4092 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:52.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643766353930376165383762333634353130626535626639336639 Dec 13 06:23:52.126000 audit: BPF prog-id=206 op=UNLOAD Dec 13 06:23:52.126000 audit: BPF prog-id=205 op=UNLOAD Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 06:23:52.126000 audit: BPF prog-id=207 op=LOAD Dec 13 06:23:52.126000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000393fd8 items=0 ppid=4092 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:23:52.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643766353930376165383762333634353130626535626639336639 Dec 13 06:23:52.164770 env[1185]: time="2024-12-13T06:23:52.163617943Z" level=info msg="StartContainer for \"6bd7f5907ae87b364510be5bf93f951a551c4c7c86fcc7d46ca74df8a3bfc008\" returns successfully" Dec 13 06:23:52.423788 kubelet[2066]: I1213 06:23:52.423678 2066 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 06:23:52.424297 kubelet[2066]: I1213 06:23:52.424283 2066 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 06:23:52.668842 kubelet[2066]: I1213 06:23:52.668806 2066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-drh75" podStartSLOduration=32.415656936 podStartE2EDuration="42.668721526s" podCreationTimestamp="2024-12-13 06:23:10 +0000 UTC" firstStartedPulling="2024-12-13 06:23:41.787821886 +0000 UTC m=+53.815446521" lastFinishedPulling="2024-12-13 06:23:52.040886456 +0000 UTC m=+64.068511111" observedRunningTime="2024-12-13 06:23:52.668378854 +0000 UTC m=+64.696003521" watchObservedRunningTime="2024-12-13 06:23:52.668721526 +0000 UTC m=+64.696346305" Dec 13 06:23:54.683812 systemd[1]: run-containerd-runc-k8s.io-3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2-runc.52YPaW.mount: Deactivated successfully. Dec 13 06:23:56.753089 systemd[1]: run-containerd-runc-k8s.io-c6edca93e66eb2bdeb32d8c66f1d5ef063852d337b173224c4fe4083e67df6be-runc.XH09mZ.mount: Deactivated successfully. Dec 13 06:23:59.358000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.369549 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 06:23:59.369649 kernel: audit: type=1400 audit(1734071039.358:1343): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.358000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00257bc60 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:59.385294 kernel: audit: type=1300 audit(1734071039.358:1343): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00257bc60 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.385382 kernel: audit: type=1327 audit(1734071039.358:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:59.385733 kernel: audit: type=1400 audit(1734071039.358:1344): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.358000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.358000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00257bc80 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.393297 kernel: audit: type=1300 audit(1734071039.358:1344): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00257bc80 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.393360 kernel: audit: type=1327 audit(1734071039.358:1344): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:59.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:59.367000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.400596 kernel: audit: type=1400 audit(1734071039.367:1345): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.400653 kernel: audit: type=1300 audit(1734071039.367:1345): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024e1460 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.367000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024e1460 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:59.408811 kernel: audit: type=1327 audit(1734071039.367:1345): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:23:59.408903 kernel: audit: type=1400 audit(1734071039.367:1346): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.367000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:23:59.367000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024e1480 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:23:59.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:24:04.795784 kubelet[2066]: I1213 06:24:04.795617 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 06:24:04.883000 audit[4714]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:24:04.888685 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 06:24:04.889008 kernel: audit: type=1325 audit(1734071044.883:1347): table=filter:119 family=2 entries=9 op=nft_register_rule pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:24:04.883000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe04e94810 a2=0 a3=7ffe04e947fc items=0 ppid=2243 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:04.896101 kernel: audit: type=1300 audit(1734071044.883:1347): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe04e94810 a2=0 a3=7ffe04e947fc items=0 ppid=2243 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:04.896498 kernel: audit: type=1327 audit(1734071044.883:1347): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:24:04.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:24:04.905000 audit[4714]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:24:04.905000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe04e94810 a2=0 a3=7ffe04e947fc items=0 ppid=2243 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:04.912622 kernel: audit: type=1325 audit(1734071044.905:1348): table=nat:120 family=2 entries=27 op=nft_register_chain pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:24:04.912695 kernel: audit: type=1300 audit(1734071044.905:1348): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe04e94810 a2=0 a3=7ffe04e947fc items=0 ppid=2243 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:04.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:24:04.915721 kernel: audit: type=1327 audit(1734071044.905:1348): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:24:09.924176 systemd[1]: Started sshd@9-10.244.95.98:22-139.178.89.65:48722.service. Dec 13 06:24:09.934459 kernel: audit: type=1130 audit(1734071049.925:1349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.98:22-139.178.89.65:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:09.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.98:22-139.178.89.65:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:10.875000 audit[4722]: USER_ACCT pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.878812 sshd[4722]: Accepted publickey for core from 139.178.89.65 port 48722 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:10.884799 kernel: audit: type=1101 audit(1734071050.875:1350): pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.887000 audit[4722]: CRED_ACQ pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.902851 kernel: audit: type=1103 audit(1734071050.887:1351): pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.887000 audit[4722]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe48fa0000 a2=3 a3=0 items=0 ppid=1 pid=4722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:10.915301 kernel: audit: type=1006 audit(1734071050.887:1352): pid=4722 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 06:24:10.915377 kernel: audit: type=1300 audit(1734071050.887:1352): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe48fa0000 a2=3 a3=0 items=0 ppid=1 pid=4722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:10.915656 sshd[4722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:10.918761 kernel: audit: type=1327 audit(1734071050.887:1352): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:10.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:10.939614 systemd-logind[1179]: New session 10 of user core. Dec 13 06:24:10.940979 systemd[1]: Started session-10.scope. Dec 13 06:24:10.949000 audit[4722]: USER_START pid=4722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.954727 kernel: audit: type=1105 audit(1734071050.949:1353): pid=4722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.955000 audit[4724]: CRED_ACQ pid=4724 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:10.960772 kernel: audit: type=1103 audit(1734071050.955:1354): pid=4724 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:12.133128 sshd[4722]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:12.136000 audit[4722]: USER_END pid=4722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:12.145651 systemd[1]: sshd@9-10.244.95.98:22-139.178.89.65:48722.service: Deactivated successfully. Dec 13 06:24:12.147123 kernel: audit: type=1106 audit(1734071052.136:1355): pid=4722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:12.147148 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 06:24:12.136000 audit[4722]: CRED_DISP pid=4722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:12.151723 kernel: audit: type=1104 audit(1734071052.136:1356): pid=4722 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:12.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.95.98:22-139.178.89.65:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:12.154453 systemd-logind[1179]: Session 10 logged out. Waiting for processes to exit. Dec 13 06:24:12.156511 systemd-logind[1179]: Removed session 10. Dec 13 06:24:12.975565 kubelet[2066]: I1213 06:24:12.975487 2066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 06:24:13.075000 audit[4736]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:24:13.075000 audit[4736]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe33464d20 a2=0 a3=7ffe33464d0c items=0 ppid=2243 pid=4736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:13.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:24:13.081000 audit[4736]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:24:13.081000 audit[4736]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe33464d20 a2=0 a3=7ffe33464d0c items=0 ppid=2243 pid=4736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:13.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:24:17.286419 systemd[1]: Started sshd@10-10.244.95.98:22-139.178.89.65:48736.service. Dec 13 06:24:17.291763 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 06:24:17.291880 kernel: audit: type=1130 audit(1734071057.286:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.95.98:22-139.178.89.65:48736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:17.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.95.98:22-139.178.89.65:48736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:18.194000 audit[4744]: USER_ACCT pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.199497 sshd[4744]: Accepted publickey for core from 139.178.89.65 port 48736 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:18.205776 kernel: audit: type=1101 audit(1734071058.194:1361): pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.205992 kernel: audit: type=1103 audit(1734071058.203:1362): pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.203000 audit[4744]: CRED_ACQ pid=4744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.207301 sshd[4744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:18.213014 kernel: audit: type=1006 audit(1734071058.203:1363): pid=4744 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 06:24:18.222080 kernel: audit: type=1300 audit(1734071058.203:1363): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbe332dd0 a2=3 a3=0 items=0 ppid=1 pid=4744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:18.222192 kernel: audit: type=1327 audit(1734071058.203:1363): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:18.203000 audit[4744]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbe332dd0 a2=3 a3=0 items=0 ppid=1 pid=4744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:18.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:18.219850 systemd[1]: Started session-11.scope. Dec 13 06:24:18.221367 systemd-logind[1179]: New session 11 of user core. Dec 13 06:24:18.224000 audit[4744]: USER_START pid=4744 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.225000 audit[4746]: CRED_ACQ pid=4746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.235001 kernel: audit: type=1105 audit(1734071058.224:1364): pid=4744 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:18.235169 kernel: audit: type=1103 audit(1734071058.225:1365): pid=4746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:19.063819 sshd[4744]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:19.063000 audit[4744]: USER_END pid=4744 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:19.085741 kernel: audit: type=1106 audit(1734071059.063:1366): pid=4744 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:19.085831 kernel: audit: type=1104 audit(1734071059.064:1367): pid=4744 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:19.064000 audit[4744]: CRED_DISP pid=4744 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:19.068501 systemd-logind[1179]: Session 11 logged out. Waiting for processes to exit. Dec 13 06:24:19.069540 systemd[1]: sshd@10-10.244.95.98:22-139.178.89.65:48736.service: Deactivated successfully. Dec 13 06:24:19.070562 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 06:24:19.071548 systemd-logind[1179]: Removed session 11. Dec 13 06:24:19.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.95.98:22-139.178.89.65:48736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:24.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.98:22-139.178.89.65:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:24.219272 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 06:24:24.219416 kernel: audit: type=1130 audit(1734071064.213:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.98:22-139.178.89.65:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:24.214384 systemd[1]: Started sshd@11-10.244.95.98:22-139.178.89.65:35142.service. Dec 13 06:24:25.123000 audit[4759]: USER_ACCT pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.128468 sshd[4759]: Accepted publickey for core from 139.178.89.65 port 35142 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:25.133782 kernel: audit: type=1101 audit(1734071065.123:1370): pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.134000 audit[4759]: CRED_ACQ pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.140839 kernel: audit: type=1103 audit(1734071065.134:1371): pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.136593 sshd[4759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:25.144762 kernel: audit: type=1006 audit(1734071065.135:1372): pid=4759 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 06:24:25.135000 audit[4759]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6293b270 a2=3 a3=0 items=0 ppid=1 pid=4759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:25.149918 kernel: audit: type=1300 audit(1734071065.135:1372): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6293b270 a2=3 a3=0 items=0 ppid=1 pid=4759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:25.150116 kernel: audit: type=1327 audit(1734071065.135:1372): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:25.135000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:25.158315 systemd-logind[1179]: New session 12 of user core. Dec 13 06:24:25.160058 systemd[1]: Started session-12.scope. Dec 13 06:24:25.168000 audit[4759]: USER_START pid=4759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.174730 kernel: audit: type=1105 audit(1734071065.168:1373): pid=4759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.175465 kernel: audit: type=1103 audit(1734071065.174:1374): pid=4778 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.174000 audit[4778]: CRED_ACQ pid=4778 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.888083 sshd[4759]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:25.891000 audit[4759]: USER_END pid=4759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.900730 kernel: audit: type=1106 audit(1734071065.891:1375): pid=4759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.894000 audit[4759]: CRED_DISP pid=4759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.904721 kernel: audit: type=1104 audit(1734071065.894:1376): pid=4759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:25.905065 systemd[1]: sshd@11-10.244.95.98:22-139.178.89.65:35142.service: Deactivated successfully. Dec 13 06:24:25.906042 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 06:24:25.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.95.98:22-139.178.89.65:35142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:25.906736 systemd-logind[1179]: Session 12 logged out. Waiting for processes to exit. Dec 13 06:24:25.907849 systemd-logind[1179]: Removed session 12. Dec 13 06:24:31.035492 systemd[1]: Started sshd@12-10.244.95.98:22-139.178.89.65:46410.service. Dec 13 06:24:31.046108 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 06:24:31.046354 kernel: audit: type=1130 audit(1734071071.037:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.95.98:22-139.178.89.65:46410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:31.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.95.98:22-139.178.89.65:46410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:31.967811 sshd[4811]: Accepted publickey for core from 139.178.89.65 port 46410 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:31.967000 audit[4811]: USER_ACCT pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:31.972923 kernel: audit: type=1101 audit(1734071071.967:1379): pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:31.974000 audit[4811]: CRED_ACQ pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:31.976099 sshd[4811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:31.981350 kernel: audit: type=1103 audit(1734071071.974:1380): pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:31.982418 kernel: audit: type=1006 audit(1734071071.974:1381): pid=4811 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 06:24:31.982473 kernel: audit: type=1300 audit(1734071071.974:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd76967ad0 a2=3 a3=0 items=0 ppid=1 pid=4811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:31.974000 audit[4811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd76967ad0 a2=3 a3=0 items=0 ppid=1 pid=4811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:31.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:31.991211 kernel: audit: type=1327 audit(1734071071.974:1381): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:31.991501 systemd-logind[1179]: New session 13 of user core. Dec 13 06:24:31.992849 systemd[1]: Started session-13.scope. Dec 13 06:24:31.999000 audit[4811]: USER_START pid=4811 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.005772 kernel: audit: type=1105 audit(1734071071.999:1382): pid=4811 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.009000 audit[4815]: CRED_ACQ pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.013765 kernel: audit: type=1103 audit(1734071072.009:1383): pid=4815 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.733843 sshd[4811]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:32.736000 audit[4811]: USER_END pid=4811 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.741282 systemd[1]: sshd@12-10.244.95.98:22-139.178.89.65:46410.service: Deactivated successfully. Dec 13 06:24:32.743310 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 06:24:32.748790 kernel: audit: type=1106 audit(1734071072.736:1384): pid=4811 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.749277 systemd-logind[1179]: Session 13 logged out. Waiting for processes to exit. Dec 13 06:24:32.737000 audit[4811]: CRED_DISP pid=4811 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.95.98:22-139.178.89.65:46410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:32.758914 kernel: audit: type=1104 audit(1734071072.737:1385): pid=4811 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:32.760050 systemd-logind[1179]: Removed session 13. Dec 13 06:24:32.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.95.98:22-139.178.89.65:46424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:32.880195 systemd[1]: Started sshd@13-10.244.95.98:22-139.178.89.65:46424.service. Dec 13 06:24:33.771000 audit[4825]: USER_ACCT pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:33.775116 sshd[4825]: Accepted publickey for core from 139.178.89.65 port 46424 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:33.773000 audit[4825]: CRED_ACQ pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:33.773000 audit[4825]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc56050c0 a2=3 a3=0 items=0 ppid=1 pid=4825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:33.773000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:33.774720 sshd[4825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:33.781414 systemd-logind[1179]: New session 14 of user core. Dec 13 06:24:33.782250 systemd[1]: Started session-14.scope. Dec 13 06:24:33.787000 audit[4825]: USER_START pid=4825 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:33.788000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:34.591997 sshd[4825]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:34.594000 audit[4825]: USER_END pid=4825 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:34.595000 audit[4825]: CRED_DISP pid=4825 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:34.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.95.98:22-139.178.89.65:46424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:34.600648 systemd-logind[1179]: Session 14 logged out. Waiting for processes to exit. Dec 13 06:24:34.600863 systemd[1]: sshd@13-10.244.95.98:22-139.178.89.65:46424.service: Deactivated successfully. Dec 13 06:24:34.602136 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 06:24:34.603544 systemd-logind[1179]: Removed session 14. Dec 13 06:24:34.740738 systemd[1]: Started sshd@14-10.244.95.98:22-139.178.89.65:46430.service. Dec 13 06:24:34.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.95.98:22-139.178.89.65:46430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:35.688000 audit[4835]: USER_ACCT pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:35.690364 sshd[4835]: Accepted publickey for core from 139.178.89.65 port 46430 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:35.692000 audit[4835]: CRED_ACQ pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:35.693000 audit[4835]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde0eb76b0 a2=3 a3=0 items=0 ppid=1 pid=4835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:35.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:35.695919 sshd[4835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:35.705918 systemd-logind[1179]: New session 15 of user core. Dec 13 06:24:35.706282 systemd[1]: Started session-15.scope. Dec 13 06:24:35.711000 audit[4835]: USER_START pid=4835 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:35.713000 audit[4837]: CRED_ACQ pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:36.413211 sshd[4835]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:36.419000 audit[4835]: USER_END pid=4835 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:36.428002 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 06:24:36.428126 kernel: audit: type=1106 audit(1734071076.419:1402): pid=4835 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:36.430587 systemd[1]: sshd@14-10.244.95.98:22-139.178.89.65:46430.service: Deactivated successfully. Dec 13 06:24:36.432041 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 06:24:36.419000 audit[4835]: CRED_DISP pid=4835 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:36.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.95.98:22-139.178.89.65:46430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:36.441793 kernel: audit: type=1104 audit(1734071076.419:1403): pid=4835 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:36.441956 kernel: audit: type=1131 audit(1734071076.427:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.95.98:22-139.178.89.65:46430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:36.442651 systemd-logind[1179]: Session 15 logged out. Waiting for processes to exit. Dec 13 06:24:36.445082 systemd-logind[1179]: Removed session 15. Dec 13 06:24:41.570828 systemd[1]: Started sshd@15-10.244.95.98:22-139.178.89.65:51344.service. Dec 13 06:24:41.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.95.98:22-139.178.89.65:51344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:41.577725 kernel: audit: type=1130 audit(1734071081.570:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.95.98:22-139.178.89.65:51344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:42.468000 audit[4847]: USER_ACCT pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.470527 sshd[4847]: Accepted publickey for core from 139.178.89.65 port 51344 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:42.480947 kernel: audit: type=1101 audit(1734071082.468:1406): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.482000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.483911 sshd[4847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:42.488782 kernel: audit: type=1103 audit(1734071082.482:1407): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.488874 kernel: audit: type=1006 audit(1734071082.482:1408): pid=4847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 06:24:42.482000 audit[4847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6dee0ae0 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:42.495361 kernel: audit: type=1300 audit(1734071082.482:1408): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6dee0ae0 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:42.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:42.500797 kernel: audit: type=1327 audit(1734071082.482:1408): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:42.499695 systemd-logind[1179]: New session 16 of user core. Dec 13 06:24:42.500040 systemd[1]: Started session-16.scope. Dec 13 06:24:42.507000 audit[4847]: USER_START pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.508000 audit[4850]: CRED_ACQ pid=4850 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.516396 kernel: audit: type=1105 audit(1734071082.507:1409): pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.516473 kernel: audit: type=1103 audit(1734071082.508:1410): pid=4850 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:42.808000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:42.819752 kernel: audit: type=1400 audit(1734071082.808:1411): avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:42.808000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0a920 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:42.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:24:42.809000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:42.809000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d29d10 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:42.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:24:42.826735 kernel: audit: type=1300 audit(1734071082.808:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0a920 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:43.192492 sshd[4847]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:43.194000 audit[4847]: USER_END pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:43.194000 audit[4847]: CRED_DISP pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:43.197662 systemd[1]: sshd@15-10.244.95.98:22-139.178.89.65:51344.service: Deactivated successfully. Dec 13 06:24:43.198655 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 06:24:43.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.95.98:22-139.178.89.65:51344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:43.199351 systemd-logind[1179]: Session 16 logged out. Waiting for processes to exit. Dec 13 06:24:43.200678 systemd-logind[1179]: Removed session 16. Dec 13 06:24:43.309000 audit[4150]: AVC avc: denied { watch } for pid=4150 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_06_23_24.2862229634/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c552,c768 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c552,c768 tclass=file permissive=0 Dec 13 06:24:43.309000 audit[4150]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016e4800 a2=fc6 a3=0 items=0 ppid=3642 pid=4150 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c552,c768 key=(null) Dec 13 06:24:43.309000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 06:24:43.506000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526915 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:43.506000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:43.506000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007fbd440 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:24:43.506000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:24:43.506000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00996c6c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:24:43.506000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:24:43.508000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526921 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:43.508000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00996c6f0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:24:43.508000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:24:43.512000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:43.512000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00c1076c0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:24:43.512000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:24:43.557000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:43.557000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00996c870 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:24:43.557000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:24:43.557000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:43.557000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00c1079a0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:24:43.557000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:24:44.959085 systemd[1]: run-containerd-runc-k8s.io-3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2-runc.zloAlg.mount: Deactivated successfully. Dec 13 06:24:48.347092 systemd[1]: Started sshd@16-10.244.95.98:22-139.178.89.65:52186.service. Dec 13 06:24:48.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.95.98:22-139.178.89.65:52186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:48.350301 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 06:24:48.350397 kernel: audit: type=1130 audit(1734071088.345:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.95.98:22-139.178.89.65:52186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:48.764000 audit[4236]: AVC avc: denied { watch } for pid=4236 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_06_23_24.418350835/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c827 tclass=file permissive=0 Dec 13 06:24:48.775752 kernel: audit: type=1400 audit(1734071088.764:1424): avc: denied { watch } for pid=4236 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_06_23_24.418350835/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c827 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c827 tclass=file permissive=0 Dec 13 06:24:48.775978 kernel: audit: type=1300 audit(1734071088.764:1424): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000faeec0 a2=fc6 a3=0 items=0 ppid=3985 pid=4236 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c827 key=(null) Dec 13 06:24:48.764000 audit[4236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000faeec0 a2=fc6 a3=0 items=0 ppid=3985 pid=4236 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c827 key=(null) Dec 13 06:24:48.764000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 06:24:48.787729 kernel: audit: type=1327 audit(1734071088.764:1424): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 06:24:49.271000 audit[4888]: USER_ACCT pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:49.272846 sshd[4888]: Accepted publickey for core from 139.178.89.65 port 52186 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:49.280922 kernel: audit: type=1101 audit(1734071089.271:1425): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:49.283000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:49.288754 kernel: audit: type=1103 audit(1734071089.283:1426): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:49.289663 sshd[4888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:49.288000 audit[4888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b81aaa0 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:49.296175 kernel: audit: type=1006 audit(1734071089.288:1427): pid=4888 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 06:24:49.296280 kernel: audit: type=1300 audit(1734071089.288:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b81aaa0 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:49.296542 kernel: audit: type=1327 audit(1734071089.288:1427): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:49.288000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:49.300935 systemd-logind[1179]: New session 17 of user core. Dec 13 06:24:49.302446 systemd[1]: Started session-17.scope. Dec 13 06:24:49.310000 audit[4888]: USER_START pid=4888 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:49.316322 kernel: audit: type=1105 audit(1734071089.310:1428): pid=4888 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:49.315000 audit[4890]: CRED_ACQ pid=4890 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:50.065069 sshd[4888]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:50.069000 audit[4888]: USER_END pid=4888 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:50.070000 audit[4888]: CRED_DISP pid=4888 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:50.077462 systemd-logind[1179]: Session 17 logged out. Waiting for processes to exit. Dec 13 06:24:50.078239 systemd[1]: sshd@16-10.244.95.98:22-139.178.89.65:52186.service: Deactivated successfully. Dec 13 06:24:50.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.95.98:22-139.178.89.65:52186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:50.080267 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 06:24:50.081243 systemd-logind[1179]: Removed session 17. Dec 13 06:24:54.685589 systemd[1]: run-containerd-runc-k8s.io-3a78648242893e4ee1892282db82f5edaaed2b4179f55082ddcf40740f0908e2-runc.2CVjT7.mount: Deactivated successfully. Dec 13 06:24:55.220038 systemd[1]: Started sshd@17-10.244.95.98:22-139.178.89.65:52194.service. Dec 13 06:24:55.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.95.98:22-139.178.89.65:52194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:55.222194 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 06:24:55.223145 kernel: audit: type=1130 audit(1734071095.220:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.95.98:22-139.178.89.65:52194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:56.157000 audit[4918]: USER_ACCT pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.170485 sshd[4918]: Accepted publickey for core from 139.178.89.65 port 52194 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:24:56.171112 kernel: audit: type=1101 audit(1734071096.157:1434): pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.168000 audit[4918]: CRED_ACQ pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.171676 sshd[4918]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:24:56.177959 kernel: audit: type=1103 audit(1734071096.168:1435): pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.178035 kernel: audit: type=1006 audit(1734071096.168:1436): pid=4918 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 06:24:56.168000 audit[4918]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff77f21a60 a2=3 a3=0 items=0 ppid=1 pid=4918 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:56.183847 kernel: audit: type=1300 audit(1734071096.168:1436): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff77f21a60 a2=3 a3=0 items=0 ppid=1 pid=4918 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:24:56.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:56.185434 kernel: audit: type=1327 audit(1734071096.168:1436): proctitle=737368643A20636F7265205B707269765D Dec 13 06:24:56.188765 systemd-logind[1179]: New session 18 of user core. Dec 13 06:24:56.190142 systemd[1]: Started session-18.scope. Dec 13 06:24:56.193000 audit[4918]: USER_START pid=4918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.200402 kernel: audit: type=1105 audit(1734071096.193:1437): pid=4918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.200455 kernel: audit: type=1103 audit(1734071096.198:1438): pid=4926 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.198000 audit[4926]: CRED_ACQ pid=4926 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.974999 sshd[4918]: pam_unix(sshd:session): session closed for user core Dec 13 06:24:56.976000 audit[4918]: USER_END pid=4918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.981428 systemd[1]: sshd@17-10.244.95.98:22-139.178.89.65:52194.service: Deactivated successfully. Dec 13 06:24:56.984550 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 06:24:56.987118 systemd-logind[1179]: Session 18 logged out. Waiting for processes to exit. Dec 13 06:24:56.988104 systemd-logind[1179]: Removed session 18. Dec 13 06:24:56.990013 kernel: audit: type=1106 audit(1734071096.976:1439): pid=4918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.990074 kernel: audit: type=1104 audit(1734071096.976:1440): pid=4918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.976000 audit[4918]: CRED_DISP pid=4918 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:24:56.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.95.98:22-139.178.89.65:52194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:24:59.375000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:59.375000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:59.375000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00117da80 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:59.375000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:24:59.376000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:59.376000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00117daa0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:59.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:24:59.375000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00257b600 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:59.375000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:24:59.378000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:24:59.378000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00117dac0 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:24:59.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:25:02.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.95.98:22-139.178.89.65:41298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:02.133226 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 06:25:02.133480 kernel: audit: type=1130 audit(1734071102.126:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.95.98:22-139.178.89.65:41298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:02.126856 systemd[1]: Started sshd@18-10.244.95.98:22-139.178.89.65:41298.service. Dec 13 06:25:03.035000 audit[4962]: USER_ACCT pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.038384 sshd[4962]: Accepted publickey for core from 139.178.89.65 port 41298 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:03.043920 kernel: audit: type=1101 audit(1734071103.035:1447): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.043000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.045268 sshd[4962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:03.049270 kernel: audit: type=1103 audit(1734071103.043:1448): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.044000 audit[4962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47f04c40 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:03.056476 kernel: audit: type=1006 audit(1734071103.044:1449): pid=4962 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 06:25:03.056577 kernel: audit: type=1300 audit(1734071103.044:1449): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47f04c40 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:03.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:03.059159 kernel: audit: type=1327 audit(1734071103.044:1449): proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:03.063406 systemd-logind[1179]: New session 19 of user core. Dec 13 06:25:03.064542 systemd[1]: Started session-19.scope. Dec 13 06:25:03.071000 audit[4962]: USER_START pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.077863 kernel: audit: type=1105 audit(1734071103.071:1450): pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.077000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.081741 kernel: audit: type=1103 audit(1734071103.077:1451): pid=4964 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.897753 sshd[4962]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:03.900000 audit[4962]: USER_END pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.909668 kernel: audit: type=1106 audit(1734071103.900:1452): pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.908772 systemd[1]: sshd@18-10.244.95.98:22-139.178.89.65:41298.service: Deactivated successfully. Dec 13 06:25:03.900000 audit[4962]: CRED_DISP pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.909922 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 06:25:03.915203 kernel: audit: type=1104 audit(1734071103.900:1453): pid=4962 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:03.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.95.98:22-139.178.89.65:41298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:03.914799 systemd-logind[1179]: Session 19 logged out. Waiting for processes to exit. Dec 13 06:25:03.916753 systemd-logind[1179]: Removed session 19. Dec 13 06:25:04.043555 systemd[1]: Started sshd@19-10.244.95.98:22-139.178.89.65:41308.service. Dec 13 06:25:04.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.95.98:22-139.178.89.65:41308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:04.961000 audit[4974]: USER_ACCT pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:04.963892 sshd[4974]: Accepted publickey for core from 139.178.89.65 port 41308 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:04.964000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:04.964000 audit[4974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6a1b9280 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:04.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:04.967047 sshd[4974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:04.974334 systemd-logind[1179]: New session 20 of user core. Dec 13 06:25:04.974631 systemd[1]: Started session-20.scope. Dec 13 06:25:04.978000 audit[4974]: USER_START pid=4974 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:04.980000 audit[4976]: CRED_ACQ pid=4976 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:05.968315 sshd[4974]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:05.971000 audit[4974]: USER_END pid=4974 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:05.971000 audit[4974]: CRED_DISP pid=4974 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:05.976039 systemd[1]: sshd@19-10.244.95.98:22-139.178.89.65:41308.service: Deactivated successfully. Dec 13 06:25:05.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.95.98:22-139.178.89.65:41308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:05.977255 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 06:25:05.978335 systemd-logind[1179]: Session 20 logged out. Waiting for processes to exit. Dec 13 06:25:05.980052 systemd-logind[1179]: Removed session 20. Dec 13 06:25:06.115463 systemd[1]: Started sshd@20-10.244.95.98:22-139.178.89.65:41320.service. Dec 13 06:25:06.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.95.98:22-139.178.89.65:41320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:07.029000 audit[4984]: USER_ACCT pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:07.032081 sshd[4984]: Accepted publickey for core from 139.178.89.65 port 41320 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:07.032000 audit[4984]: CRED_ACQ pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:07.032000 audit[4984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe53ad9b90 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:07.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:07.035146 sshd[4984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:07.042351 systemd-logind[1179]: New session 21 of user core. Dec 13 06:25:07.043341 systemd[1]: Started session-21.scope. Dec 13 06:25:07.050000 audit[4984]: USER_START pid=4984 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:07.052000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:10.001000 audit[5012]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.005357 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 06:25:10.005603 kernel: audit: type=1325 audit(1734071110.001:1470): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.001000 audit[5012]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffda2000e80 a2=0 a3=7ffda2000e6c items=0 ppid=2243 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.013907 kernel: audit: type=1300 audit(1734071110.001:1470): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffda2000e80 a2=0 a3=7ffda2000e6c items=0 ppid=2243 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.017000 audit[5012]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.021361 kernel: audit: type=1327 audit(1734071110.001:1470): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.021447 kernel: audit: type=1325 audit(1734071110.017:1471): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.021483 kernel: audit: type=1300 audit(1734071110.017:1471): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffda2000e80 a2=0 a3=0 items=0 ppid=2243 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.017000 audit[5012]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffda2000e80 a2=0 a3=0 items=0 ppid=2243 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.026766 kernel: audit: type=1327 audit(1734071110.017:1471): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.045000 audit[5014]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.048758 kernel: audit: type=1325 audit(1734071110.045:1472): table=filter:125 family=2 entries=32 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.045000 audit[5014]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff74544600 a2=0 a3=7fff745445ec items=0 ppid=2243 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.056216 kernel: audit: type=1300 audit(1734071110.045:1472): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff74544600 a2=0 a3=7fff745445ec items=0 ppid=2243 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.056313 kernel: audit: type=1327 audit(1734071110.045:1472): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.078000 audit[5014]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.078000 audit[5014]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff74544600 a2=0 a3=0 items=0 ppid=2243 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:10.082734 kernel: audit: type=1325 audit(1734071110.078:1473): table=nat:126 family=2 entries=22 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:10.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:10.134625 sshd[4984]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:10.141000 audit[4984]: USER_END pid=4984 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:10.142000 audit[4984]: CRED_DISP pid=4984 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:10.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.95.98:22-139.178.89.65:41320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:10.150439 systemd[1]: sshd@20-10.244.95.98:22-139.178.89.65:41320.service: Deactivated successfully. Dec 13 06:25:10.154629 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 06:25:10.155757 systemd-logind[1179]: Session 21 logged out. Waiting for processes to exit. Dec 13 06:25:10.157799 systemd-logind[1179]: Removed session 21. Dec 13 06:25:10.284764 systemd[1]: Started sshd@21-10.244.95.98:22-139.178.89.65:33400.service. Dec 13 06:25:10.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.95.98:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:11.205000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:11.206506 sshd[5017]: Accepted publickey for core from 139.178.89.65 port 33400 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:11.209000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:11.209000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc972ce80 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:11.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:11.211901 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:11.220256 systemd[1]: Started session-22.scope. Dec 13 06:25:11.222408 systemd-logind[1179]: New session 22 of user core. Dec 13 06:25:11.228000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:11.230000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:12.449246 sshd[5017]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:12.453000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:12.453000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:12.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.95.98:22-139.178.89.65:33400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:12.456737 systemd[1]: sshd@21-10.244.95.98:22-139.178.89.65:33400.service: Deactivated successfully. Dec 13 06:25:12.457968 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 06:25:12.460220 systemd-logind[1179]: Session 22 logged out. Waiting for processes to exit. Dec 13 06:25:12.462695 systemd-logind[1179]: Removed session 22. Dec 13 06:25:12.603063 systemd[1]: Started sshd@22-10.244.95.98:22-139.178.89.65:33402.service. Dec 13 06:25:12.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.95.98:22-139.178.89.65:33402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:13.519000 audit[5027]: USER_ACCT pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:13.522107 sshd[5027]: Accepted publickey for core from 139.178.89.65 port 33402 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:13.521000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:13.522000 audit[5027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3c525960 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:13.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:13.524022 sshd[5027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:13.536096 systemd-logind[1179]: New session 23 of user core. Dec 13 06:25:13.536527 systemd[1]: Started session-23.scope. Dec 13 06:25:13.543000 audit[5027]: USER_START pid=5027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:13.545000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:14.300215 sshd[5027]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:14.301000 audit[5027]: USER_END pid=5027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:14.301000 audit[5027]: CRED_DISP pid=5027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:14.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.95.98:22-139.178.89.65:33402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:14.307841 systemd-logind[1179]: Session 23 logged out. Waiting for processes to exit. Dec 13 06:25:14.308538 systemd[1]: sshd@22-10.244.95.98:22-139.178.89.65:33402.service: Deactivated successfully. Dec 13 06:25:14.311188 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 06:25:14.312664 systemd-logind[1179]: Removed session 23. Dec 13 06:25:19.456171 systemd[1]: Started sshd@23-10.244.95.98:22-139.178.89.65:54884.service. Dec 13 06:25:19.459440 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 06:25:19.460056 kernel: audit: type=1130 audit(1734071119.456:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.95.98:22-139.178.89.65:54884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:19.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.95.98:22-139.178.89.65:54884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:20.363000 audit[5039]: USER_ACCT pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.365245 sshd[5039]: Accepted publickey for core from 139.178.89.65 port 54884 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:20.375879 kernel: audit: type=1101 audit(1734071120.363:1496): pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.375996 kernel: audit: type=1103 audit(1734071120.374:1497): pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.374000 audit[5039]: CRED_ACQ pid=5039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.377072 sshd[5039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:20.375000 audit[5039]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfca84c30 a2=3 a3=0 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:20.388422 kernel: audit: type=1006 audit(1734071120.375:1498): pid=5039 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 06:25:20.388494 kernel: audit: type=1300 audit(1734071120.375:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfca84c30 a2=3 a3=0 items=0 ppid=1 pid=5039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:20.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:20.389870 kernel: audit: type=1327 audit(1734071120.375:1498): proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:20.391816 systemd-logind[1179]: New session 24 of user core. Dec 13 06:25:20.392847 systemd[1]: Started session-24.scope. Dec 13 06:25:20.397000 audit[5039]: USER_START pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.399000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.414772 kernel: audit: type=1105 audit(1734071120.397:1499): pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:20.414924 kernel: audit: type=1103 audit(1734071120.399:1500): pid=5041 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:21.101959 sshd[5039]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:21.104000 audit[5039]: USER_END pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:21.123248 kernel: audit: type=1106 audit(1734071121.104:1501): pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:21.123877 kernel: audit: type=1104 audit(1734071121.104:1502): pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:21.104000 audit[5039]: CRED_DISP pid=5039 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:21.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.95.98:22-139.178.89.65:54884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:21.115951 systemd-logind[1179]: Session 24 logged out. Waiting for processes to exit. Dec 13 06:25:21.117649 systemd[1]: sshd@23-10.244.95.98:22-139.178.89.65:54884.service: Deactivated successfully. Dec 13 06:25:21.118547 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 06:25:21.122742 systemd-logind[1179]: Removed session 24. Dec 13 06:25:22.465000 audit[5051]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:22.465000 audit[5051]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdfd9a79a0 a2=0 a3=7ffdfd9a798c items=0 ppid=2243 pid=5051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:22.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:22.473000 audit[5051]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 06:25:22.473000 audit[5051]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdfd9a79a0 a2=0 a3=7ffdfd9a798c items=0 ppid=2243 pid=5051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:22.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 06:25:26.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.95.98:22-139.178.89.65:54892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:26.258590 systemd[1]: Started sshd@24-10.244.95.98:22-139.178.89.65:54892.service. Dec 13 06:25:26.261004 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 06:25:26.261093 kernel: audit: type=1130 audit(1734071126.258:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.95.98:22-139.178.89.65:54892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:27.213000 audit[5073]: USER_ACCT pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.215760 sshd[5073]: Accepted publickey for core from 139.178.89.65 port 54892 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:27.217728 kernel: audit: type=1101 audit(1734071127.213:1507): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.218738 kernel: audit: type=1103 audit(1734071127.217:1508): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.217000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.222226 sshd[5073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:27.224719 kernel: audit: type=1006 audit(1734071127.218:1509): pid=5073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 06:25:27.218000 audit[5073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc049df2c0 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:27.229721 kernel: audit: type=1300 audit(1734071127.218:1509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc049df2c0 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:27.230676 kernel: audit: type=1327 audit(1734071127.218:1509): proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:27.218000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:27.234057 systemd-logind[1179]: New session 25 of user core. Dec 13 06:25:27.236939 systemd[1]: Started session-25.scope. Dec 13 06:25:27.250000 audit[5073]: USER_START pid=5073 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.269740 kernel: audit: type=1105 audit(1734071127.250:1510): pid=5073 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.270183 kernel: audit: type=1103 audit(1734071127.250:1511): pid=5096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:27.250000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:28.016967 sshd[5073]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:28.018000 audit[5073]: USER_END pid=5073 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:28.036739 kernel: audit: type=1106 audit(1734071128.018:1512): pid=5073 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:28.019000 audit[5073]: CRED_DISP pid=5073 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:28.038215 systemd[1]: sshd@24-10.244.95.98:22-139.178.89.65:54892.service: Deactivated successfully. Dec 13 06:25:28.040278 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 06:25:28.042835 kernel: audit: type=1104 audit(1734071128.019:1513): pid=5073 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:28.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.95.98:22-139.178.89.65:54892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:28.042741 systemd-logind[1179]: Session 25 logged out. Waiting for processes to exit. Dec 13 06:25:28.043734 systemd-logind[1179]: Removed session 25. Dec 13 06:25:33.168171 systemd[1]: Started sshd@25-10.244.95.98:22-139.178.89.65:44998.service. Dec 13 06:25:33.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.95.98:22-139.178.89.65:44998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:33.175907 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 06:25:33.176768 kernel: audit: type=1130 audit(1734071133.167:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.95.98:22-139.178.89.65:44998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:34.091741 kernel: audit: type=1101 audit(1734071134.079:1516): pid=5108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.079000 audit[5108]: USER_ACCT pid=5108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.092325 sshd[5108]: Accepted publickey for core from 139.178.89.65 port 44998 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:34.090000 audit[5108]: CRED_ACQ pid=5108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.093019 sshd[5108]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:34.099474 kernel: audit: type=1103 audit(1734071134.090:1517): pid=5108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.100596 kernel: audit: type=1006 audit(1734071134.090:1518): pid=5108 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 06:25:34.100655 kernel: audit: type=1300 audit(1734071134.090:1518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3df35d80 a2=3 a3=0 items=0 ppid=1 pid=5108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:34.090000 audit[5108]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3df35d80 a2=3 a3=0 items=0 ppid=1 pid=5108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:34.090000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:34.106573 kernel: audit: type=1327 audit(1734071134.090:1518): proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:34.112575 systemd-logind[1179]: New session 26 of user core. Dec 13 06:25:34.114790 systemd[1]: Started session-26.scope. Dec 13 06:25:34.119000 audit[5108]: USER_START pid=5108 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.122000 audit[5110]: CRED_ACQ pid=5110 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.128598 kernel: audit: type=1105 audit(1734071134.119:1519): pid=5108 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.128661 kernel: audit: type=1103 audit(1734071134.122:1520): pid=5110 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.830820 sshd[5108]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:34.833000 audit[5108]: USER_END pid=5108 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.844731 kernel: audit: type=1106 audit(1734071134.833:1521): pid=5108 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.844897 kernel: audit: type=1104 audit(1734071134.834:1522): pid=5108 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.834000 audit[5108]: CRED_DISP pid=5108 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:34.842963 systemd[1]: sshd@25-10.244.95.98:22-139.178.89.65:44998.service: Deactivated successfully. Dec 13 06:25:34.844205 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 06:25:34.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.95.98:22-139.178.89.65:44998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:34.848802 systemd-logind[1179]: Session 26 logged out. Waiting for processes to exit. Dec 13 06:25:34.850632 systemd-logind[1179]: Removed session 26. Dec 13 06:25:39.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.95.98:22-139.178.89.65:44872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:39.984006 systemd[1]: Started sshd@26-10.244.95.98:22-139.178.89.65:44872.service. Dec 13 06:25:39.987106 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 06:25:39.987232 kernel: audit: type=1130 audit(1734071139.983:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.95.98:22-139.178.89.65:44872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:40.898331 sshd[5121]: Accepted publickey for core from 139.178.89.65 port 44872 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 06:25:40.897000 audit[5121]: USER_ACCT pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.907175 kernel: audit: type=1101 audit(1734071140.897:1525): pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.908000 audit[5121]: CRED_ACQ pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.913812 kernel: audit: type=1103 audit(1734071140.908:1526): pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.917720 kernel: audit: type=1006 audit(1734071140.908:1527): pid=5121 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 06:25:40.917937 sshd[5121]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 06:25:40.908000 audit[5121]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfafd9450 a2=3 a3=0 items=0 ppid=1 pid=5121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:40.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:40.923982 kernel: audit: type=1300 audit(1734071140.908:1527): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfafd9450 a2=3 a3=0 items=0 ppid=1 pid=5121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 06:25:40.924059 kernel: audit: type=1327 audit(1734071140.908:1527): proctitle=737368643A20636F7265205B707269765D Dec 13 06:25:40.931825 systemd[1]: Started session-27.scope. Dec 13 06:25:40.932531 systemd-logind[1179]: New session 27 of user core. Dec 13 06:25:40.940000 audit[5121]: USER_START pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.945000 audit[5123]: CRED_ACQ pid=5123 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.950036 kernel: audit: type=1105 audit(1734071140.940:1528): pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:40.950394 kernel: audit: type=1103 audit(1734071140.945:1529): pid=5123 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:41.682331 sshd[5121]: pam_unix(sshd:session): session closed for user core Dec 13 06:25:41.683000 audit[5121]: USER_END pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:41.683000 audit[5121]: CRED_DISP pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:41.691108 systemd[1]: sshd@26-10.244.95.98:22-139.178.89.65:44872.service: Deactivated successfully. Dec 13 06:25:41.692274 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 06:25:41.694034 kernel: audit: type=1106 audit(1734071141.683:1530): pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:41.694098 kernel: audit: type=1104 audit(1734071141.683:1531): pid=5121 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 06:25:41.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.95.98:22-139.178.89.65:44872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 06:25:41.694516 systemd-logind[1179]: Session 27 logged out. Waiting for processes to exit. Dec 13 06:25:41.698847 systemd-logind[1179]: Removed session 27. Dec 13 06:25:42.811000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:42.811000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ba9e30 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:25:42.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:25:42.812000 audit[1933]: AVC avc: denied { watch } for pid=1933 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:42.812000 audit[1933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dc9820 a2=fc6 a3=0 items=0 ppid=1783 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c683 key=(null) Dec 13 06:25:42.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 06:25:43.310000 audit[4150]: AVC avc: denied { watch } for pid=4150 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_06_23_24.2862229634/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c552,c768 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c552,c768 tclass=file permissive=0 Dec 13 06:25:43.310000 audit[4150]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001711120 a2=fc6 a3=0 items=0 ppid=3642 pid=4150 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c552,c768 key=(null) Dec 13 06:25:43.310000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 06:25:43.510000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526915 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:43.510000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00e3b62d0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:25:43.510000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:25:43.511000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:43.511000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00995a9f0 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:25:43.511000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:25:43.511000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526921 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:43.511000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00e3b6300 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:25:43.511000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:25:43.513000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:43.513000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00cb0ce80 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:25:43.513000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:25:43.559000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526913 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:43.559000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00c51bd40 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:25:43.559000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 06:25:43.559000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 06:25:43.559000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00995ac60 a2=fc6 a3=0 items=0 ppid=1804 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c879 key=(null) Dec 13 06:25:43.559000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E39352E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562