Dec 13 07:30:27.941220 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 07:30:27.941264 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 07:30:27.941283 kernel: BIOS-provided physical RAM map: Dec 13 07:30:27.941294 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 07:30:27.941303 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 07:30:27.941312 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 07:30:27.941323 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 07:30:27.941332 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 07:30:27.941342 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 07:30:27.941351 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 07:30:27.941365 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 07:30:27.941374 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 07:30:27.941383 kernel: NX (Execute Disable) protection: active Dec 13 07:30:27.941393 kernel: SMBIOS 2.8 present. Dec 13 07:30:27.941405 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 07:30:27.941415 kernel: Hypervisor detected: KVM Dec 13 07:30:27.941429 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 07:30:27.941439 kernel: kvm-clock: cpu 0, msr 7c19b001, primary cpu clock Dec 13 07:30:27.941449 kernel: kvm-clock: using sched offset of 4857359645 cycles Dec 13 07:30:27.941460 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 07:30:27.941470 kernel: tsc: Detected 2799.998 MHz processor Dec 13 07:30:27.941481 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 07:30:27.941491 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 07:30:27.941501 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 07:30:27.941512 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 07:30:27.941539 kernel: Using GB pages for direct mapping Dec 13 07:30:27.941549 kernel: ACPI: Early table checksum verification disabled Dec 13 07:30:27.941559 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 07:30:27.941569 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941579 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941589 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941599 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 07:30:27.941608 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941618 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941632 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941642 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 07:30:27.941652 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 07:30:27.941662 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 07:30:27.941671 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 07:30:27.941681 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 07:30:27.941696 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 07:30:27.941711 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 07:30:27.941721 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 07:30:27.941732 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 07:30:27.941742 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 07:30:27.941752 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 07:30:27.941763 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 07:30:27.941786 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 07:30:27.941800 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 07:30:27.941811 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 07:30:27.941822 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 07:30:27.941832 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 07:30:27.941843 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 07:30:27.941854 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 07:30:27.941877 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 07:30:27.941888 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 07:30:27.941898 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 07:30:27.941908 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 07:30:27.941922 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 07:30:27.941933 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 07:30:27.941943 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 07:30:27.941954 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 07:30:27.941977 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 07:30:27.941988 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 07:30:27.941999 kernel: Zone ranges: Dec 13 07:30:27.942010 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 07:30:27.942021 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 07:30:27.942035 kernel: Normal empty Dec 13 07:30:27.942046 kernel: Movable zone start for each node Dec 13 07:30:27.942057 kernel: Early memory node ranges Dec 13 07:30:27.942068 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 07:30:27.942078 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 07:30:27.942089 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 07:30:27.942131 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 07:30:27.942143 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 07:30:27.942154 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 07:30:27.942170 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 07:30:27.942181 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 07:30:27.942192 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 07:30:27.942202 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 07:30:27.942213 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 07:30:27.942224 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 07:30:27.942235 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 07:30:27.942246 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 07:30:27.942256 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 07:30:27.942271 kernel: TSC deadline timer available Dec 13 07:30:27.942282 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 07:30:27.942292 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 07:30:27.942303 kernel: Booting paravirtualized kernel on KVM Dec 13 07:30:27.942314 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 07:30:27.942325 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 07:30:27.942336 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 07:30:27.942347 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 07:30:27.942357 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 07:30:27.942372 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 07:30:27.942383 kernel: kvm-guest: PV spinlocks enabled Dec 13 07:30:27.942393 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 07:30:27.942404 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 07:30:27.942415 kernel: Policy zone: DMA32 Dec 13 07:30:27.942427 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 07:30:27.942439 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 07:30:27.942449 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 07:30:27.942464 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 07:30:27.942475 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 07:30:27.942487 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 192524K reserved, 0K cma-reserved) Dec 13 07:30:27.942498 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 07:30:27.942509 kernel: Kernel/User page tables isolation: enabled Dec 13 07:30:27.942519 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 07:30:27.942530 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 07:30:27.942541 kernel: rcu: Hierarchical RCU implementation. Dec 13 07:30:27.942553 kernel: rcu: RCU event tracing is enabled. Dec 13 07:30:27.942568 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 07:30:27.942579 kernel: Rude variant of Tasks RCU enabled. Dec 13 07:30:27.942590 kernel: Tracing variant of Tasks RCU enabled. Dec 13 07:30:27.942601 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 07:30:27.942612 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 07:30:27.942636 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 07:30:27.942646 kernel: random: crng init done Dec 13 07:30:27.942669 kernel: Console: colour VGA+ 80x25 Dec 13 07:30:27.942680 kernel: printk: console [tty0] enabled Dec 13 07:30:27.942691 kernel: printk: console [ttyS0] enabled Dec 13 07:30:27.942702 kernel: ACPI: Core revision 20210730 Dec 13 07:30:27.942712 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 07:30:27.942727 kernel: x2apic enabled Dec 13 07:30:27.942738 kernel: Switched APIC routing to physical x2apic. Dec 13 07:30:27.942749 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Dec 13 07:30:27.942761 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 13 07:30:27.942772 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 07:30:27.942787 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 07:30:27.942798 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 07:30:27.942809 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 07:30:27.942820 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 07:30:27.942831 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 07:30:27.942842 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 07:30:27.942853 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Dec 13 07:30:27.942864 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 07:30:27.942875 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 07:30:27.942886 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 07:30:27.942897 kernel: MMIO Stale Data: Unknown: No mitigations Dec 13 07:30:27.942911 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 07:30:27.942922 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 07:30:27.942934 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 07:30:27.942944 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 07:30:27.942955 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 07:30:27.942966 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 07:30:27.942977 kernel: Freeing SMP alternatives memory: 32K Dec 13 07:30:27.942988 kernel: pid_max: default: 32768 minimum: 301 Dec 13 07:30:27.942999 kernel: LSM: Security Framework initializing Dec 13 07:30:27.943010 kernel: SELinux: Initializing. Dec 13 07:30:27.943021 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 07:30:27.943036 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 07:30:27.943047 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Dec 13 07:30:27.943058 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Dec 13 07:30:27.943069 kernel: signal: max sigframe size: 1776 Dec 13 07:30:27.943110 kernel: rcu: Hierarchical SRCU implementation. Dec 13 07:30:27.943125 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 07:30:27.943137 kernel: smp: Bringing up secondary CPUs ... Dec 13 07:30:27.943148 kernel: x86: Booting SMP configuration: Dec 13 07:30:27.943160 kernel: .... node #0, CPUs: #1 Dec 13 07:30:27.943176 kernel: kvm-clock: cpu 1, msr 7c19b041, secondary cpu clock Dec 13 07:30:27.943188 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 07:30:27.943199 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 07:30:27.943211 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 07:30:27.943222 kernel: smpboot: Max logical packages: 16 Dec 13 07:30:27.943234 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Dec 13 07:30:27.943245 kernel: devtmpfs: initialized Dec 13 07:30:27.943256 kernel: x86/mm: Memory block size: 128MB Dec 13 07:30:27.943268 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 07:30:27.943279 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 07:30:27.943295 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 07:30:27.943306 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 07:30:27.943318 kernel: audit: initializing netlink subsys (disabled) Dec 13 07:30:27.943329 kernel: audit: type=2000 audit(1734075026.901:1): state=initialized audit_enabled=0 res=1 Dec 13 07:30:27.943340 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 07:30:27.943352 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 07:30:27.943363 kernel: cpuidle: using governor menu Dec 13 07:30:27.943374 kernel: ACPI: bus type PCI registered Dec 13 07:30:27.943386 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 07:30:27.943401 kernel: dca service started, version 1.12.1 Dec 13 07:30:27.943412 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 07:30:27.943424 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 07:30:27.943435 kernel: PCI: Using configuration type 1 for base access Dec 13 07:30:27.943447 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 07:30:27.943458 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 07:30:27.943469 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 07:30:27.943481 kernel: ACPI: Added _OSI(Module Device) Dec 13 07:30:27.943492 kernel: ACPI: Added _OSI(Processor Device) Dec 13 07:30:27.943507 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 07:30:27.943519 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 07:30:27.943530 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 07:30:27.943541 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 07:30:27.943553 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 07:30:27.943564 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 07:30:27.943575 kernel: ACPI: Interpreter enabled Dec 13 07:30:27.943587 kernel: ACPI: PM: (supports S0 S5) Dec 13 07:30:27.943598 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 07:30:27.943614 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 07:30:27.943625 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 07:30:27.943636 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 07:30:27.943916 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 07:30:27.944090 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 07:30:27.944272 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 07:30:27.944289 kernel: PCI host bridge to bus 0000:00 Dec 13 07:30:27.944452 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 07:30:27.944585 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 07:30:27.944716 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 07:30:27.944845 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 07:30:27.944986 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 07:30:27.945147 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 07:30:27.945281 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 07:30:27.945458 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 07:30:27.945618 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 07:30:27.945786 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 07:30:27.945929 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 07:30:27.946073 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 07:30:27.951312 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 07:30:27.951501 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.951665 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 07:30:27.951843 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.952003 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 07:30:27.952245 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.952395 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 07:30:27.952549 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.952701 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 07:30:27.952879 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.953047 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 07:30:27.955509 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.955667 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 07:30:27.955832 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.955980 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 07:30:27.956195 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 07:30:27.956346 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 07:30:27.956506 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 07:30:27.956653 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 07:30:27.956796 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 07:30:27.956956 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 07:30:27.957175 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 07:30:27.957338 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 07:30:27.957483 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 07:30:27.957625 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 07:30:27.957767 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 07:30:27.957924 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 07:30:27.958078 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 07:30:27.958258 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 07:30:27.958402 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 07:30:27.958545 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 07:30:27.958730 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 07:30:27.958876 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 07:30:27.959036 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 07:30:27.964280 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 07:30:27.964454 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 07:30:27.964617 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 07:30:27.964766 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 07:30:27.964962 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 07:30:27.965182 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 07:30:27.965345 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 07:30:27.965496 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 07:30:27.965649 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 07:30:27.965816 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 07:30:27.965968 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 07:30:27.966159 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 07:30:27.966324 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 07:30:27.966493 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 07:30:27.966710 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 07:30:27.966873 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 07:30:27.967058 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 07:30:27.967252 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 07:30:27.967408 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 07:30:27.967578 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 07:30:27.967748 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 07:30:27.967909 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 07:30:27.975147 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 07:30:27.975320 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 07:30:27.975492 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 07:30:27.975649 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 07:30:27.975793 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 07:30:27.975950 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 07:30:27.976136 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 07:30:27.976285 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 07:30:27.976429 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 07:30:27.976586 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 07:30:27.976754 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 07:30:27.976913 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 07:30:27.976943 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 07:30:27.976956 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 07:30:27.976974 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 07:30:27.976986 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 07:30:27.976998 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 07:30:27.977010 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 07:30:27.977030 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 07:30:27.977042 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 07:30:27.977054 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 07:30:27.977066 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 07:30:27.977079 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 07:30:27.977126 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 07:30:27.977139 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 07:30:27.977150 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 07:30:27.977162 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 07:30:27.977174 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 07:30:27.977185 kernel: iommu: Default domain type: Translated Dec 13 07:30:27.977197 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 07:30:27.977345 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 07:30:27.977489 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 07:30:27.977644 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 07:30:27.977661 kernel: vgaarb: loaded Dec 13 07:30:27.977674 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 07:30:27.977686 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 07:30:27.977698 kernel: PTP clock support registered Dec 13 07:30:27.977709 kernel: PCI: Using ACPI for IRQ routing Dec 13 07:30:27.977721 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 07:30:27.977733 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 07:30:27.977751 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 07:30:27.977762 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 07:30:27.977774 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 07:30:27.977786 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 07:30:27.977798 kernel: pnp: PnP ACPI init Dec 13 07:30:27.977988 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 07:30:27.978008 kernel: pnp: PnP ACPI: found 5 devices Dec 13 07:30:27.978021 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 07:30:27.978049 kernel: NET: Registered PF_INET protocol family Dec 13 07:30:27.978062 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 07:30:27.978074 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 07:30:27.978086 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 07:30:27.978120 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 07:30:27.978133 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 07:30:27.978145 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 07:30:27.978157 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 07:30:27.978169 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 07:30:27.978186 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 07:30:27.978198 kernel: NET: Registered PF_XDP protocol family Dec 13 07:30:27.978345 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 07:30:27.978493 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 07:30:27.978659 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 07:30:27.978825 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 07:30:27.978969 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 07:30:27.979152 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 07:30:27.979308 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 07:30:27.979451 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 07:30:27.979593 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 07:30:27.979735 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 07:30:27.979876 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 07:30:27.980025 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 07:30:27.980194 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 07:30:27.980342 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 07:30:27.980488 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 07:30:27.980632 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 07:30:27.980784 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 07:30:27.980936 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 07:30:27.981083 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 07:30:27.981257 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 07:30:27.981406 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 07:30:27.981556 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 07:30:27.981725 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 07:30:27.981872 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 07:30:27.982018 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 07:30:27.989256 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 07:30:27.989421 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 07:30:27.989570 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 07:30:27.989727 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 07:30:27.989891 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 07:30:27.990036 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 07:30:27.990214 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 07:30:27.990359 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 07:30:27.990505 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 07:30:27.990651 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 07:30:27.990808 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 07:30:27.990956 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 07:30:27.991141 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 07:30:27.991290 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 07:30:27.991435 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 07:30:27.991579 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 07:30:27.991723 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 07:30:27.991867 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 07:30:27.992019 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 07:30:27.992192 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 07:30:27.992339 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 07:30:27.992487 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 07:30:27.992632 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 07:30:27.992782 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 07:30:27.992968 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 07:30:27.993164 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 07:30:27.993299 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 07:30:27.993435 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 07:30:27.993584 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 07:30:27.993729 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 07:30:27.993874 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 07:30:27.994035 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 07:30:27.994213 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 07:30:27.994358 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 07:30:27.994523 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 07:30:27.994703 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 07:30:27.994860 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 07:30:27.995011 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 07:30:27.995213 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 07:30:27.995364 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 07:30:27.995516 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 07:30:27.995679 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 07:30:27.995833 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 07:30:27.995985 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 07:30:28.003216 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 07:30:28.003379 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 07:30:28.003541 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 07:30:28.003719 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 07:30:28.003859 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 07:30:28.003997 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 07:30:28.004172 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 07:30:28.004334 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 07:30:28.004506 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 07:30:28.004682 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 07:30:28.004833 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 07:30:28.004981 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 07:30:28.005000 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 07:30:28.005013 kernel: PCI: CLS 0 bytes, default 64 Dec 13 07:30:28.005025 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 07:30:28.005042 kernel: software IO TLB: mapped [mem 0x0000000073000000-0x0000000077000000] (64MB) Dec 13 07:30:28.005054 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 07:30:28.005066 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Dec 13 07:30:28.005228 kernel: Initialise system trusted keyrings Dec 13 07:30:28.005245 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 07:30:28.005258 kernel: Key type asymmetric registered Dec 13 07:30:28.005270 kernel: Asymmetric key parser 'x509' registered Dec 13 07:30:28.005283 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 07:30:28.005295 kernel: io scheduler mq-deadline registered Dec 13 07:30:28.005314 kernel: io scheduler kyber registered Dec 13 07:30:28.005327 kernel: io scheduler bfq registered Dec 13 07:30:28.005509 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 07:30:28.005667 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 07:30:28.005811 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.005958 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 07:30:28.006124 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 07:30:28.006278 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.006425 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 07:30:28.006570 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 07:30:28.006714 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.006859 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 07:30:28.007004 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 07:30:28.007189 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.007336 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 07:30:28.007479 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 07:30:28.007620 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.007765 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 07:30:28.007908 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 07:30:28.008074 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.008252 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 07:30:28.008396 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 07:30:28.008545 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.008697 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 07:30:28.008840 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 07:30:28.008993 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 07:30:28.009012 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 07:30:28.009026 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 07:30:28.009039 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 07:30:28.009051 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 07:30:28.009064 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 07:30:28.009076 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 07:30:28.009089 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 07:30:28.009133 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 07:30:28.009147 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 07:30:28.009308 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 07:30:28.009450 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 07:30:28.009612 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T07:30:27 UTC (1734075027) Dec 13 07:30:28.009770 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 07:30:28.009788 kernel: intel_pstate: CPU model not supported Dec 13 07:30:28.009806 kernel: NET: Registered PF_INET6 protocol family Dec 13 07:30:28.009819 kernel: Segment Routing with IPv6 Dec 13 07:30:28.009832 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 07:30:28.009844 kernel: NET: Registered PF_PACKET protocol family Dec 13 07:30:28.009857 kernel: Key type dns_resolver registered Dec 13 07:30:28.009869 kernel: IPI shorthand broadcast: enabled Dec 13 07:30:28.009882 kernel: sched_clock: Marking stable (946477953, 209364390)->(1432476104, -276633761) Dec 13 07:30:28.009894 kernel: registered taskstats version 1 Dec 13 07:30:28.009907 kernel: Loading compiled-in X.509 certificates Dec 13 07:30:28.009919 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 07:30:28.009935 kernel: Key type .fscrypt registered Dec 13 07:30:28.009948 kernel: Key type fscrypt-provisioning registered Dec 13 07:30:28.009960 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 07:30:28.009973 kernel: ima: Allocated hash algorithm: sha1 Dec 13 07:30:28.009985 kernel: ima: No architecture policies found Dec 13 07:30:28.009997 kernel: clk: Disabling unused clocks Dec 13 07:30:28.010010 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 07:30:28.010022 kernel: Write protecting the kernel read-only data: 28672k Dec 13 07:30:28.010039 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 07:30:28.010052 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 07:30:28.010064 kernel: Run /init as init process Dec 13 07:30:28.010076 kernel: with arguments: Dec 13 07:30:28.010089 kernel: /init Dec 13 07:30:28.012905 kernel: with environment: Dec 13 07:30:28.012918 kernel: HOME=/ Dec 13 07:30:28.012930 kernel: TERM=linux Dec 13 07:30:28.012942 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 07:30:28.012966 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 07:30:28.012991 systemd[1]: Detected virtualization kvm. Dec 13 07:30:28.013005 systemd[1]: Detected architecture x86-64. Dec 13 07:30:28.013018 systemd[1]: Running in initrd. Dec 13 07:30:28.013030 systemd[1]: No hostname configured, using default hostname. Dec 13 07:30:28.013044 systemd[1]: Hostname set to . Dec 13 07:30:28.013057 systemd[1]: Initializing machine ID from VM UUID. Dec 13 07:30:28.013070 systemd[1]: Queued start job for default target initrd.target. Dec 13 07:30:28.013087 systemd[1]: Started systemd-ask-password-console.path. Dec 13 07:30:28.013130 systemd[1]: Reached target cryptsetup.target. Dec 13 07:30:28.013144 systemd[1]: Reached target paths.target. Dec 13 07:30:28.013157 systemd[1]: Reached target slices.target. Dec 13 07:30:28.013170 systemd[1]: Reached target swap.target. Dec 13 07:30:28.013183 systemd[1]: Reached target timers.target. Dec 13 07:30:28.013197 systemd[1]: Listening on iscsid.socket. Dec 13 07:30:28.013215 systemd[1]: Listening on iscsiuio.socket. Dec 13 07:30:28.013228 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 07:30:28.013241 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 07:30:28.013259 systemd[1]: Listening on systemd-journald.socket. Dec 13 07:30:28.013272 systemd[1]: Listening on systemd-networkd.socket. Dec 13 07:30:28.013285 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 07:30:28.013299 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 07:30:28.013312 systemd[1]: Reached target sockets.target. Dec 13 07:30:28.013329 systemd[1]: Starting kmod-static-nodes.service... Dec 13 07:30:28.013347 systemd[1]: Finished network-cleanup.service. Dec 13 07:30:28.013360 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 07:30:28.013374 systemd[1]: Starting systemd-journald.service... Dec 13 07:30:28.013387 systemd[1]: Starting systemd-modules-load.service... Dec 13 07:30:28.013401 systemd[1]: Starting systemd-resolved.service... Dec 13 07:30:28.013414 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 07:30:28.013427 systemd[1]: Finished kmod-static-nodes.service. Dec 13 07:30:28.013453 systemd-journald[200]: Journal started Dec 13 07:30:28.013536 systemd-journald[200]: Runtime Journal (/run/log/journal/385cb86b28904551859053a4ab985f5d) is 4.7M, max 38.1M, 33.3M free. Dec 13 07:30:27.948593 systemd-modules-load[201]: Inserted module 'overlay' Dec 13 07:30:28.035332 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 07:30:28.035380 kernel: Bridge firewalling registered Dec 13 07:30:27.993349 systemd-resolved[202]: Positive Trust Anchors: Dec 13 07:30:28.048643 systemd[1]: Started systemd-resolved.service. Dec 13 07:30:28.048673 kernel: audit: type=1130 audit(1734075028.035:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.048701 systemd[1]: Started systemd-journald.service. Dec 13 07:30:28.048720 kernel: audit: type=1130 audit(1734075028.042:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:27.993373 systemd-resolved[202]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 07:30:28.056451 kernel: audit: type=1130 audit(1734075028.049:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.056487 kernel: SCSI subsystem initialized Dec 13 07:30:28.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:27.993416 systemd-resolved[202]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 07:30:27.999284 systemd-resolved[202]: Defaulting to hostname 'linux'. Dec 13 07:30:28.022242 systemd-modules-load[201]: Inserted module 'br_netfilter' Dec 13 07:30:28.049535 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 07:30:28.080838 kernel: audit: type=1130 audit(1734075028.059:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.080885 kernel: audit: type=1130 audit(1734075028.060:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.080904 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 07:30:28.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.060271 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 07:30:28.061027 systemd[1]: Reached target nss-lookup.target. Dec 13 07:30:28.064533 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 07:30:28.075657 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 07:30:28.087245 kernel: device-mapper: uevent: version 1.0.3 Dec 13 07:30:28.087280 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 07:30:28.088316 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 07:30:28.097242 kernel: audit: type=1130 audit(1734075028.088:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.093912 systemd-modules-load[201]: Inserted module 'dm_multipath' Dec 13 07:30:28.103560 kernel: audit: type=1130 audit(1734075028.096:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.094619 systemd[1]: Finished systemd-modules-load.service. Dec 13 07:30:28.097726 systemd[1]: Starting systemd-sysctl.service... Dec 13 07:30:28.112403 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 07:30:28.118302 kernel: audit: type=1130 audit(1734075028.112:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.113404 systemd[1]: Finished systemd-sysctl.service. Dec 13 07:30:28.136371 kernel: audit: type=1130 audit(1734075028.118:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.120016 systemd[1]: Starting dracut-cmdline.service... Dec 13 07:30:28.138276 dracut-cmdline[224]: dracut-dracut-053 Dec 13 07:30:28.141238 dracut-cmdline[224]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 07:30:28.223183 kernel: Loading iSCSI transport class v2.0-870. Dec 13 07:30:28.244175 kernel: iscsi: registered transport (tcp) Dec 13 07:30:28.270999 kernel: iscsi: registered transport (qla4xxx) Dec 13 07:30:28.271110 kernel: QLogic iSCSI HBA Driver Dec 13 07:30:28.317601 systemd[1]: Finished dracut-cmdline.service. Dec 13 07:30:28.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.321393 systemd[1]: Starting dracut-pre-udev.service... Dec 13 07:30:28.381156 kernel: raid6: sse2x4 gen() 14047 MB/s Dec 13 07:30:28.399154 kernel: raid6: sse2x4 xor() 7782 MB/s Dec 13 07:30:28.417131 kernel: raid6: sse2x2 gen() 9458 MB/s Dec 13 07:30:28.435138 kernel: raid6: sse2x2 xor() 8326 MB/s Dec 13 07:30:28.453143 kernel: raid6: sse2x1 gen() 9496 MB/s Dec 13 07:30:28.471721 kernel: raid6: sse2x1 xor() 7526 MB/s Dec 13 07:30:28.471772 kernel: raid6: using algorithm sse2x4 gen() 14047 MB/s Dec 13 07:30:28.471790 kernel: raid6: .... xor() 7782 MB/s, rmw enabled Dec 13 07:30:28.472928 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 07:30:28.489142 kernel: xor: automatically using best checksumming function avx Dec 13 07:30:28.601132 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 07:30:28.613702 systemd[1]: Finished dracut-pre-udev.service. Dec 13 07:30:28.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.614000 audit: BPF prog-id=7 op=LOAD Dec 13 07:30:28.614000 audit: BPF prog-id=8 op=LOAD Dec 13 07:30:28.615575 systemd[1]: Starting systemd-udevd.service... Dec 13 07:30:28.633045 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 07:30:28.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.640618 systemd[1]: Started systemd-udevd.service. Dec 13 07:30:28.642372 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 07:30:28.659176 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Dec 13 07:30:28.698670 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 07:30:28.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.700649 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 07:30:28.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:28.789800 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 07:30:28.879117 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 07:30:28.909619 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 07:30:28.909645 kernel: GPT:17805311 != 125829119 Dec 13 07:30:28.909662 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 07:30:28.909695 kernel: GPT:17805311 != 125829119 Dec 13 07:30:28.909711 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 07:30:28.909727 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 07:30:28.909743 kernel: ACPI: bus type USB registered Dec 13 07:30:28.909759 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 07:30:28.909775 kernel: usbcore: registered new interface driver usbfs Dec 13 07:30:28.909790 kernel: usbcore: registered new interface driver hub Dec 13 07:30:28.909805 kernel: usbcore: registered new device driver usb Dec 13 07:30:28.967121 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (457) Dec 13 07:30:28.970506 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 07:30:28.975578 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 07:30:28.977274 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 07:30:28.985245 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 07:30:29.106482 kernel: AVX version of gcm_enc/dec engaged. Dec 13 07:30:29.106543 kernel: AES CTR mode by8 optimization enabled Dec 13 07:30:29.106559 kernel: libata version 3.00 loaded. Dec 13 07:30:29.106597 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 07:30:29.107049 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 07:30:29.107253 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 07:30:29.107542 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 07:30:29.107772 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 07:30:29.107944 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 07:30:29.108188 kernel: hub 1-0:1.0: USB hub found Dec 13 07:30:29.108494 kernel: hub 1-0:1.0: 4 ports detected Dec 13 07:30:29.108693 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 07:30:29.108982 kernel: hub 2-0:1.0: USB hub found Dec 13 07:30:29.109227 kernel: hub 2-0:1.0: 4 ports detected Dec 13 07:30:29.109416 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 07:30:29.109664 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 07:30:29.109682 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 07:30:29.109886 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 07:30:29.110040 kernel: scsi host0: ahci Dec 13 07:30:29.110254 kernel: scsi host1: ahci Dec 13 07:30:29.110465 kernel: scsi host2: ahci Dec 13 07:30:29.110642 kernel: scsi host3: ahci Dec 13 07:30:29.110827 kernel: scsi host4: ahci Dec 13 07:30:29.111166 kernel: scsi host5: ahci Dec 13 07:30:29.111346 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 41 Dec 13 07:30:29.111371 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 41 Dec 13 07:30:29.111388 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 41 Dec 13 07:30:29.111404 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 41 Dec 13 07:30:29.111419 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 41 Dec 13 07:30:29.111434 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 41 Dec 13 07:30:29.116680 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 07:30:29.120229 systemd[1]: Starting disk-uuid.service... Dec 13 07:30:29.133147 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 07:30:29.137188 disk-uuid[528]: Primary Header is updated. Dec 13 07:30:29.137188 disk-uuid[528]: Secondary Entries is updated. Dec 13 07:30:29.137188 disk-uuid[528]: Secondary Header is updated. Dec 13 07:30:29.255124 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 07:30:29.354142 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 07:30:29.354236 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 07:30:29.357120 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 07:30:29.358640 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 07:30:29.360152 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 07:30:29.361670 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 07:30:29.400131 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 07:30:29.406957 kernel: usbcore: registered new interface driver usbhid Dec 13 07:30:29.407006 kernel: usbhid: USB HID core driver Dec 13 07:30:29.416129 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Dec 13 07:30:29.416170 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 07:30:30.162623 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 07:30:30.163166 disk-uuid[529]: The operation has completed successfully. Dec 13 07:30:30.214355 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 07:30:30.214514 systemd[1]: Finished disk-uuid.service. Dec 13 07:30:30.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.216561 systemd[1]: Starting verity-setup.service... Dec 13 07:30:30.238133 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Dec 13 07:30:30.297555 systemd[1]: Found device dev-mapper-usr.device. Dec 13 07:30:30.299550 systemd[1]: Mounting sysusr-usr.mount... Dec 13 07:30:30.301503 systemd[1]: Finished verity-setup.service. Dec 13 07:30:30.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.393124 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 07:30:30.394048 systemd[1]: Mounted sysusr-usr.mount. Dec 13 07:30:30.394869 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 07:30:30.396073 systemd[1]: Starting ignition-setup.service... Dec 13 07:30:30.398962 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 07:30:30.417569 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 07:30:30.417666 kernel: BTRFS info (device vda6): using free space tree Dec 13 07:30:30.417697 kernel: BTRFS info (device vda6): has skinny extents Dec 13 07:30:30.435390 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 07:30:30.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.446504 systemd[1]: Finished ignition-setup.service. Dec 13 07:30:30.448496 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 07:30:30.530691 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 07:30:30.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.532000 audit: BPF prog-id=9 op=LOAD Dec 13 07:30:30.533948 systemd[1]: Starting systemd-networkd.service... Dec 13 07:30:30.565005 systemd-networkd[711]: lo: Link UP Dec 13 07:30:30.566087 systemd-networkd[711]: lo: Gained carrier Dec 13 07:30:30.568691 systemd-networkd[711]: Enumeration completed Dec 13 07:30:30.570273 systemd[1]: Started systemd-networkd.service. Dec 13 07:30:30.571607 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 07:30:30.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.571833 systemd[1]: Reached target network.target. Dec 13 07:30:30.587765 systemd-networkd[711]: eth0: Link UP Dec 13 07:30:30.587773 systemd-networkd[711]: eth0: Gained carrier Dec 13 07:30:30.591409 systemd[1]: Starting iscsiuio.service... Dec 13 07:30:30.603723 systemd[1]: Started iscsiuio.service. Dec 13 07:30:30.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.607241 systemd[1]: Starting iscsid.service... Dec 13 07:30:30.611959 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 07:30:30.611959 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 07:30:30.611959 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 07:30:30.611959 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 07:30:30.611959 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 07:30:30.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.619415 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 07:30:30.614184 systemd[1]: Started iscsid.service. Dec 13 07:30:30.617573 systemd[1]: Starting dracut-initqueue.service... Dec 13 07:30:30.633256 systemd-networkd[711]: eth0: DHCPv4 address 10.230.40.198/30, gateway 10.230.40.197 acquired from 10.230.40.197 Dec 13 07:30:30.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.641811 systemd[1]: Finished dracut-initqueue.service. Dec 13 07:30:30.642640 systemd[1]: Reached target remote-fs-pre.target. Dec 13 07:30:30.643257 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 07:30:30.643858 systemd[1]: Reached target remote-fs.target. Dec 13 07:30:30.649874 systemd[1]: Starting dracut-pre-mount.service... Dec 13 07:30:30.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.662375 systemd[1]: Finished dracut-pre-mount.service. Dec 13 07:30:30.677067 ignition[638]: Ignition 2.14.0 Dec 13 07:30:30.677107 ignition[638]: Stage: fetch-offline Dec 13 07:30:30.677224 ignition[638]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:30.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.677264 ignition[638]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:30.681923 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 07:30:30.678489 ignition[638]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:30.684280 systemd[1]: Starting ignition-fetch.service... Dec 13 07:30:30.678619 ignition[638]: parsed url from cmdline: "" Dec 13 07:30:30.678626 ignition[638]: no config URL provided Dec 13 07:30:30.678635 ignition[638]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 07:30:30.678650 ignition[638]: no config at "/usr/lib/ignition/user.ign" Dec 13 07:30:30.678661 ignition[638]: failed to fetch config: resource requires networking Dec 13 07:30:30.680771 ignition[638]: Ignition finished successfully Dec 13 07:30:30.695060 ignition[730]: Ignition 2.14.0 Dec 13 07:30:30.695077 ignition[730]: Stage: fetch Dec 13 07:30:30.695234 ignition[730]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:30.695265 ignition[730]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:30.696272 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:30.696381 ignition[730]: parsed url from cmdline: "" Dec 13 07:30:30.696388 ignition[730]: no config URL provided Dec 13 07:30:30.696397 ignition[730]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 07:30:30.696425 ignition[730]: no config at "/usr/lib/ignition/user.ign" Dec 13 07:30:30.698550 ignition[730]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 07:30:30.698601 ignition[730]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 07:30:30.699490 ignition[730]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 07:30:30.714815 ignition[730]: GET result: OK Dec 13 07:30:30.714921 ignition[730]: parsing config with SHA512: 54ad484287ef7473b70f632ba52c298eda4d7882a64c2287373ac5964b9d1b7035b92b26587f0e12f02c1f13a52c1253486192562b4bd746b414fc2b228d93a5 Dec 13 07:30:30.723962 unknown[730]: fetched base config from "system" Dec 13 07:30:30.724779 unknown[730]: fetched base config from "system" Dec 13 07:30:30.725494 unknown[730]: fetched user config from "openstack" Dec 13 07:30:30.726665 ignition[730]: fetch: fetch complete Dec 13 07:30:30.727341 ignition[730]: fetch: fetch passed Dec 13 07:30:30.728051 ignition[730]: Ignition finished successfully Dec 13 07:30:30.730523 systemd[1]: Finished ignition-fetch.service. Dec 13 07:30:30.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.732569 systemd[1]: Starting ignition-kargs.service... Dec 13 07:30:30.746753 ignition[736]: Ignition 2.14.0 Dec 13 07:30:30.747777 ignition[736]: Stage: kargs Dec 13 07:30:30.748661 ignition[736]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:30.749576 ignition[736]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:30.751796 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:30.754207 ignition[736]: kargs: kargs passed Dec 13 07:30:30.754969 ignition[736]: Ignition finished successfully Dec 13 07:30:30.756701 systemd[1]: Finished ignition-kargs.service. Dec 13 07:30:30.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.758803 systemd[1]: Starting ignition-disks.service... Dec 13 07:30:30.770330 ignition[741]: Ignition 2.14.0 Dec 13 07:30:30.771422 ignition[741]: Stage: disks Dec 13 07:30:30.772295 ignition[741]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:30.773192 ignition[741]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:30.774635 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:30.777255 ignition[741]: disks: disks passed Dec 13 07:30:30.778020 ignition[741]: Ignition finished successfully Dec 13 07:30:30.779798 systemd[1]: Finished ignition-disks.service. Dec 13 07:30:30.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.780694 systemd[1]: Reached target initrd-root-device.target. Dec 13 07:30:30.781713 systemd[1]: Reached target local-fs-pre.target. Dec 13 07:30:30.782904 systemd[1]: Reached target local-fs.target. Dec 13 07:30:30.784155 systemd[1]: Reached target sysinit.target. Dec 13 07:30:30.785239 systemd[1]: Reached target basic.target. Dec 13 07:30:30.787691 systemd[1]: Starting systemd-fsck-root.service... Dec 13 07:30:30.807170 systemd-fsck[748]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 07:30:30.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.810456 systemd[1]: Finished systemd-fsck-root.service. Dec 13 07:30:30.813074 systemd[1]: Mounting sysroot.mount... Dec 13 07:30:30.824128 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 07:30:30.824643 systemd[1]: Mounted sysroot.mount. Dec 13 07:30:30.826157 systemd[1]: Reached target initrd-root-fs.target. Dec 13 07:30:30.829299 systemd[1]: Mounting sysroot-usr.mount... Dec 13 07:30:30.831193 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 07:30:30.833123 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 07:30:30.834581 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 07:30:30.835179 systemd[1]: Reached target ignition-diskful.target. Dec 13 07:30:30.838352 systemd[1]: Mounted sysroot-usr.mount. Dec 13 07:30:30.840058 systemd[1]: Starting initrd-setup-root.service... Dec 13 07:30:30.847697 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 07:30:30.865012 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Dec 13 07:30:30.874650 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 07:30:30.883680 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 07:30:30.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:30.947807 systemd[1]: Finished initrd-setup-root.service. Dec 13 07:30:30.949862 systemd[1]: Starting ignition-mount.service... Dec 13 07:30:30.954866 systemd[1]: Starting sysroot-boot.service... Dec 13 07:30:30.963441 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 07:30:30.994415 ignition[803]: INFO : Ignition 2.14.0 Dec 13 07:30:30.996157 ignition[803]: INFO : Stage: mount Dec 13 07:30:30.996745 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:30.996745 ignition[803]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:30.998820 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:30.999655 ignition[803]: INFO : mount: mount passed Dec 13 07:30:30.999655 ignition[803]: INFO : Ignition finished successfully Dec 13 07:30:31.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:31.000196 systemd[1]: Finished sysroot-boot.service. Dec 13 07:30:31.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:31.001706 systemd[1]: Finished ignition-mount.service. Dec 13 07:30:31.004143 coreos-metadata[754]: Dec 13 07:30:31.003 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 07:30:31.019315 coreos-metadata[754]: Dec 13 07:30:31.019 INFO Fetch successful Dec 13 07:30:31.020234 coreos-metadata[754]: Dec 13 07:30:31.019 INFO wrote hostname srv-9sek4.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 07:30:31.023609 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 07:30:31.023816 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 07:30:31.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:31.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:31.322291 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 07:30:31.334132 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (811) Dec 13 07:30:31.338465 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 07:30:31.338501 kernel: BTRFS info (device vda6): using free space tree Dec 13 07:30:31.338519 kernel: BTRFS info (device vda6): has skinny extents Dec 13 07:30:31.346672 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 07:30:31.348698 systemd[1]: Starting ignition-files.service... Dec 13 07:30:31.371086 ignition[831]: INFO : Ignition 2.14.0 Dec 13 07:30:31.371086 ignition[831]: INFO : Stage: files Dec 13 07:30:31.372690 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:31.372690 ignition[831]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:31.372690 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:31.375757 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Dec 13 07:30:31.375757 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 07:30:31.375757 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 07:30:31.379353 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 07:30:31.380788 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 07:30:31.382398 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 07:30:31.381628 unknown[831]: wrote ssh authorized keys file for user: core Dec 13 07:30:31.384250 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 07:30:31.384250 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 07:30:31.573285 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 07:30:31.850412 systemd-networkd[711]: eth0: Gained IPv6LL Dec 13 07:30:31.946296 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 07:30:31.947717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 07:30:31.955706 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 07:30:31.955706 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 07:30:31.955706 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 07:30:31.955706 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 07:30:31.955706 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 07:30:31.955706 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 07:30:32.522966 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 07:30:33.012903 systemd-networkd[711]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8a31:24:19ff:fee6:28c6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8a31:24:19ff:fee6:28c6/64 assigned by NDisc. Dec 13 07:30:33.012918 systemd-networkd[711]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 07:30:33.848358 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 07:30:33.848358 ignition[831]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 07:30:33.851087 ignition[831]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 07:30:33.862937 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 07:30:33.862937 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 07:30:33.862937 ignition[831]: INFO : files: files passed Dec 13 07:30:33.862937 ignition[831]: INFO : Ignition finished successfully Dec 13 07:30:33.874781 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 07:30:33.874826 kernel: audit: type=1130 audit(1734075033.867:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.865207 systemd[1]: Finished ignition-files.service. Dec 13 07:30:33.868759 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 07:30:33.877255 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 07:30:33.878459 systemd[1]: Starting ignition-quench.service... Dec 13 07:30:33.882490 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 07:30:33.883787 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 07:30:33.894271 kernel: audit: type=1130 audit(1734075033.884:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.894332 kernel: audit: type=1131 audit(1734075033.884:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.884192 systemd[1]: Finished ignition-quench.service. Dec 13 07:30:33.901277 kernel: audit: type=1130 audit(1734075033.894:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.885211 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 07:30:33.896423 systemd[1]: Reached target ignition-complete.target. Dec 13 07:30:33.902229 systemd[1]: Starting initrd-parse-etc.service... Dec 13 07:30:33.920483 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 07:30:33.920635 systemd[1]: Finished initrd-parse-etc.service. Dec 13 07:30:33.931328 kernel: audit: type=1130 audit(1734075033.921:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.931359 kernel: audit: type=1131 audit(1734075033.921:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.922057 systemd[1]: Reached target initrd-fs.target. Dec 13 07:30:33.931890 systemd[1]: Reached target initrd.target. Dec 13 07:30:33.933207 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 07:30:33.934364 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 07:30:33.950810 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 07:30:33.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.954314 systemd[1]: Starting initrd-cleanup.service... Dec 13 07:30:33.958943 kernel: audit: type=1130 audit(1734075033.951:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.967880 systemd[1]: Stopped target nss-lookup.target. Dec 13 07:30:33.968625 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 07:30:33.982926 systemd[1]: Stopped target timers.target. Dec 13 07:30:33.984220 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 07:30:33.990435 kernel: audit: type=1131 audit(1734075033.985:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:33.984403 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 07:30:33.985576 systemd[1]: Stopped target initrd.target. Dec 13 07:30:33.991123 systemd[1]: Stopped target basic.target. Dec 13 07:30:33.993033 systemd[1]: Stopped target ignition-complete.target. Dec 13 07:30:33.994310 systemd[1]: Stopped target ignition-diskful.target. Dec 13 07:30:33.995502 systemd[1]: Stopped target initrd-root-device.target. Dec 13 07:30:33.996679 systemd[1]: Stopped target remote-fs.target. Dec 13 07:30:33.997877 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 07:30:33.999065 systemd[1]: Stopped target sysinit.target. Dec 13 07:30:34.000200 systemd[1]: Stopped target local-fs.target. Dec 13 07:30:34.001322 systemd[1]: Stopped target local-fs-pre.target. Dec 13 07:30:34.002599 systemd[1]: Stopped target swap.target. Dec 13 07:30:34.003687 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 07:30:34.009710 kernel: audit: type=1131 audit(1734075034.004:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.003934 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 07:30:34.005035 systemd[1]: Stopped target cryptsetup.target. Dec 13 07:30:34.016367 kernel: audit: type=1131 audit(1734075034.011:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.010454 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 07:30:34.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.010670 systemd[1]: Stopped dracut-initqueue.service. Dec 13 07:30:34.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.011686 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 07:30:34.011890 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 07:30:34.017301 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 07:30:34.017503 systemd[1]: Stopped ignition-files.service. Dec 13 07:30:34.019914 systemd[1]: Stopping ignition-mount.service... Dec 13 07:30:34.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.023207 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 07:30:34.023448 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 07:30:34.025736 systemd[1]: Stopping sysroot-boot.service... Dec 13 07:30:34.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.032741 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 07:30:34.033194 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 07:30:34.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.034316 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 07:30:34.034582 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 07:30:34.041551 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 07:30:34.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.041705 systemd[1]: Finished initrd-cleanup.service. Dec 13 07:30:34.045226 ignition[869]: INFO : Ignition 2.14.0 Dec 13 07:30:34.046135 ignition[869]: INFO : Stage: umount Dec 13 07:30:34.046988 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 07:30:34.047888 ignition[869]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 07:30:34.050463 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 07:30:34.052078 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 07:30:34.053519 ignition[869]: INFO : umount: umount passed Dec 13 07:30:34.054232 ignition[869]: INFO : Ignition finished successfully Dec 13 07:30:34.055437 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 07:30:34.055592 systemd[1]: Stopped ignition-mount.service. Dec 13 07:30:34.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.056982 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 07:30:34.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.057048 systemd[1]: Stopped ignition-disks.service. Dec 13 07:30:34.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.058008 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 07:30:34.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.058066 systemd[1]: Stopped ignition-kargs.service. Dec 13 07:30:34.059225 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 07:30:34.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.059283 systemd[1]: Stopped ignition-fetch.service. Dec 13 07:30:34.061215 systemd[1]: Stopped target network.target. Dec 13 07:30:34.062339 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 07:30:34.062402 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 07:30:34.063539 systemd[1]: Stopped target paths.target. Dec 13 07:30:34.064687 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 07:30:34.068170 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 07:30:34.070036 systemd[1]: Stopped target slices.target. Dec 13 07:30:34.071227 systemd[1]: Stopped target sockets.target. Dec 13 07:30:34.072360 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 07:30:34.072401 systemd[1]: Closed iscsid.socket. Dec 13 07:30:34.073425 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 07:30:34.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.073468 systemd[1]: Closed iscsiuio.socket. Dec 13 07:30:34.074521 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 07:30:34.074585 systemd[1]: Stopped ignition-setup.service. Dec 13 07:30:34.076274 systemd[1]: Stopping systemd-networkd.service... Dec 13 07:30:34.077268 systemd[1]: Stopping systemd-resolved.service... Dec 13 07:30:34.080371 systemd-networkd[711]: eth0: DHCPv6 lease lost Dec 13 07:30:34.083192 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 07:30:34.083356 systemd[1]: Stopped systemd-resolved.service. Dec 13 07:30:34.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.085796 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 07:30:34.085963 systemd[1]: Stopped systemd-networkd.service. Dec 13 07:30:34.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.091000 audit: BPF prog-id=9 op=UNLOAD Dec 13 07:30:34.091000 audit: BPF prog-id=6 op=UNLOAD Dec 13 07:30:34.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.088294 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 07:30:34.088344 systemd[1]: Closed systemd-networkd.socket. Dec 13 07:30:34.090043 systemd[1]: Stopping network-cleanup.service... Dec 13 07:30:34.090673 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 07:30:34.090750 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 07:30:34.091468 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 07:30:34.091542 systemd[1]: Stopped systemd-sysctl.service. Dec 13 07:30:34.092282 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 07:30:34.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.092337 systemd[1]: Stopped systemd-modules-load.service. Dec 13 07:30:34.093202 systemd[1]: Stopping systemd-udevd.service... Dec 13 07:30:34.099775 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 07:30:34.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.103879 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 07:30:34.104056 systemd[1]: Stopped network-cleanup.service. Dec 13 07:30:34.108649 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 07:30:34.108822 systemd[1]: Stopped systemd-udevd.service. Dec 13 07:30:34.110282 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 07:30:34.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.110343 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 07:30:34.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.111452 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 07:30:34.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.111508 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 07:30:34.114046 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 07:30:34.114181 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 07:30:34.115273 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 07:30:34.115334 systemd[1]: Stopped dracut-cmdline.service. Dec 13 07:30:34.117519 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 07:30:34.117592 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 07:30:34.119694 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 07:30:34.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.128182 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 07:30:34.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.128267 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 07:30:34.129460 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 07:30:34.129588 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 07:30:34.192201 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 07:30:34.192374 systemd[1]: Stopped sysroot-boot.service. Dec 13 07:30:34.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.193815 systemd[1]: Reached target initrd-switch-root.target. Dec 13 07:30:34.194843 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 07:30:34.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.194914 systemd[1]: Stopped initrd-setup-root.service. Dec 13 07:30:34.197272 systemd[1]: Starting initrd-switch-root.service... Dec 13 07:30:34.214138 systemd[1]: Switching root. Dec 13 07:30:34.242302 iscsid[716]: iscsid shutting down. Dec 13 07:30:34.243117 systemd-journald[200]: Received SIGTERM from PID 1 (n/a). Dec 13 07:30:34.243198 systemd-journald[200]: Journal stopped Dec 13 07:30:38.213034 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 07:30:38.213173 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 07:30:38.213198 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 07:30:38.213218 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 07:30:38.213244 kernel: SELinux: policy capability open_perms=1 Dec 13 07:30:38.213263 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 07:30:38.213288 kernel: SELinux: policy capability always_check_network=0 Dec 13 07:30:38.213307 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 07:30:38.213331 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 07:30:38.213371 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 07:30:38.213404 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 07:30:38.213426 systemd[1]: Successfully loaded SELinux policy in 63.098ms. Dec 13 07:30:38.213471 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.498ms. Dec 13 07:30:38.213500 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 07:30:38.213523 systemd[1]: Detected virtualization kvm. Dec 13 07:30:38.213542 systemd[1]: Detected architecture x86-64. Dec 13 07:30:38.213562 systemd[1]: Detected first boot. Dec 13 07:30:38.213588 systemd[1]: Hostname set to . Dec 13 07:30:38.213609 systemd[1]: Initializing machine ID from VM UUID. Dec 13 07:30:38.213641 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 07:30:38.213676 systemd[1]: Populated /etc with preset unit settings. Dec 13 07:30:38.213709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 07:30:38.213738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 07:30:38.213773 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 07:30:38.213794 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 07:30:38.213845 systemd[1]: Stopped iscsiuio.service. Dec 13 07:30:38.213901 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 07:30:38.213924 systemd[1]: Stopped iscsid.service. Dec 13 07:30:38.213950 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 07:30:38.213970 systemd[1]: Stopped initrd-switch-root.service. Dec 13 07:30:38.213991 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 07:30:38.214017 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 07:30:38.214038 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 07:30:38.214058 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 07:30:38.214077 systemd[1]: Created slice system-getty.slice. Dec 13 07:30:38.214109 systemd[1]: Created slice system-modprobe.slice. Dec 13 07:30:38.214131 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 07:30:38.214167 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 07:30:38.214187 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 07:30:38.217171 systemd[1]: Created slice user.slice. Dec 13 07:30:38.217201 systemd[1]: Started systemd-ask-password-console.path. Dec 13 07:30:38.217222 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 07:30:38.217244 systemd[1]: Set up automount boot.automount. Dec 13 07:30:38.217271 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 07:30:38.217292 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 07:30:38.217312 systemd[1]: Stopped target initrd-fs.target. Dec 13 07:30:38.217332 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 07:30:38.217351 systemd[1]: Reached target integritysetup.target. Dec 13 07:30:38.217371 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 07:30:38.217391 systemd[1]: Reached target remote-fs.target. Dec 13 07:30:38.217411 systemd[1]: Reached target slices.target. Dec 13 07:30:38.217431 systemd[1]: Reached target swap.target. Dec 13 07:30:38.217450 systemd[1]: Reached target torcx.target. Dec 13 07:30:38.217485 systemd[1]: Reached target veritysetup.target. Dec 13 07:30:38.217507 systemd[1]: Listening on systemd-coredump.socket. Dec 13 07:30:38.217526 systemd[1]: Listening on systemd-initctl.socket. Dec 13 07:30:38.217546 systemd[1]: Listening on systemd-networkd.socket. Dec 13 07:30:38.217566 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 07:30:38.217585 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 07:30:38.217604 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 07:30:38.217624 systemd[1]: Mounting dev-hugepages.mount... Dec 13 07:30:38.217644 systemd[1]: Mounting dev-mqueue.mount... Dec 13 07:30:38.217675 systemd[1]: Mounting media.mount... Dec 13 07:30:38.217697 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 07:30:38.217716 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 07:30:38.217735 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 07:30:38.217755 systemd[1]: Mounting tmp.mount... Dec 13 07:30:38.217774 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 07:30:38.217794 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 07:30:38.217814 systemd[1]: Starting kmod-static-nodes.service... Dec 13 07:30:38.217835 systemd[1]: Starting modprobe@configfs.service... Dec 13 07:30:38.217873 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 07:30:38.217896 systemd[1]: Starting modprobe@drm.service... Dec 13 07:30:38.217923 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 07:30:38.217945 systemd[1]: Starting modprobe@fuse.service... Dec 13 07:30:38.217965 systemd[1]: Starting modprobe@loop.service... Dec 13 07:30:38.217985 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 07:30:38.218012 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 07:30:38.218034 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 07:30:38.218060 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 07:30:38.218105 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 07:30:38.218129 systemd[1]: Stopped systemd-journald.service. Dec 13 07:30:38.218148 kernel: fuse: init (API version 7.34) Dec 13 07:30:38.218174 systemd[1]: Starting systemd-journald.service... Dec 13 07:30:38.218204 systemd[1]: Starting systemd-modules-load.service... Dec 13 07:30:38.218223 systemd[1]: Starting systemd-network-generator.service... Dec 13 07:30:38.218243 kernel: loop: module loaded Dec 13 07:30:38.218277 systemd[1]: Starting systemd-remount-fs.service... Dec 13 07:30:38.218299 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 07:30:38.218330 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 07:30:38.218358 systemd[1]: Stopped verity-setup.service. Dec 13 07:30:38.218395 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 07:30:38.218417 systemd[1]: Mounted dev-hugepages.mount. Dec 13 07:30:38.218436 systemd[1]: Mounted dev-mqueue.mount. Dec 13 07:30:38.218463 systemd[1]: Mounted media.mount. Dec 13 07:30:38.218496 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 07:30:38.218528 systemd-journald[979]: Journal started Dec 13 07:30:38.218632 systemd-journald[979]: Runtime Journal (/run/log/journal/385cb86b28904551859053a4ab985f5d) is 4.7M, max 38.1M, 33.3M free. Dec 13 07:30:34.423000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 07:30:38.220581 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 07:30:34.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 07:30:34.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 07:30:34.500000 audit: BPF prog-id=10 op=LOAD Dec 13 07:30:34.500000 audit: BPF prog-id=10 op=UNLOAD Dec 13 07:30:34.500000 audit: BPF prog-id=11 op=LOAD Dec 13 07:30:34.500000 audit: BPF prog-id=11 op=UNLOAD Dec 13 07:30:34.620000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 07:30:34.620000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:30:34.620000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 07:30:34.623000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 07:30:34.623000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:30:34.623000 audit: CWD cwd="/" Dec 13 07:30:34.623000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:34.623000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:34.623000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 07:30:37.946000 audit: BPF prog-id=12 op=LOAD Dec 13 07:30:37.946000 audit: BPF prog-id=3 op=UNLOAD Dec 13 07:30:37.947000 audit: BPF prog-id=13 op=LOAD Dec 13 07:30:37.947000 audit: BPF prog-id=14 op=LOAD Dec 13 07:30:37.947000 audit: BPF prog-id=4 op=UNLOAD Dec 13 07:30:37.947000 audit: BPF prog-id=5 op=UNLOAD Dec 13 07:30:37.948000 audit: BPF prog-id=15 op=LOAD Dec 13 07:30:37.948000 audit: BPF prog-id=12 op=UNLOAD Dec 13 07:30:37.948000 audit: BPF prog-id=16 op=LOAD Dec 13 07:30:37.948000 audit: BPF prog-id=17 op=LOAD Dec 13 07:30:37.948000 audit: BPF prog-id=13 op=UNLOAD Dec 13 07:30:37.948000 audit: BPF prog-id=14 op=UNLOAD Dec 13 07:30:38.225635 systemd[1]: Started systemd-journald.service. Dec 13 07:30:37.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:37.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:37.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:37.961000 audit: BPF prog-id=15 op=UNLOAD Dec 13 07:30:37.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:37.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.145000 audit: BPF prog-id=18 op=LOAD Dec 13 07:30:38.145000 audit: BPF prog-id=19 op=LOAD Dec 13 07:30:38.145000 audit: BPF prog-id=20 op=LOAD Dec 13 07:30:38.145000 audit: BPF prog-id=16 op=UNLOAD Dec 13 07:30:38.145000 audit: BPF prog-id=17 op=UNLOAD Dec 13 07:30:38.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.205000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 07:30:38.205000 audit[979]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdb9976710 a2=4000 a3=7ffdb99767ac items=0 ppid=1 pid=979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:30:38.205000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 07:30:38.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.616156 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 07:30:37.941075 systemd[1]: Queued start job for default target multi-user.target. Dec 13 07:30:34.616843 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 07:30:37.941117 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 07:30:34.616889 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 07:30:37.950409 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 07:30:34.616976 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 07:30:38.225820 systemd[1]: Mounted tmp.mount. Dec 13 07:30:34.616995 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 07:30:38.230509 systemd[1]: Finished kmod-static-nodes.service. Dec 13 07:30:34.617051 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 07:30:34.617072 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 07:30:38.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.231689 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 07:30:34.617474 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 07:30:34.617554 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 07:30:34.617580 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 07:30:34.619591 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 07:30:34.619651 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 07:30:38.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:34.619696 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 07:30:38.233246 systemd[1]: Finished modprobe@configfs.service. Dec 13 07:30:34.619729 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 07:30:38.234614 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 07:30:34.619761 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 07:30:34.619785 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 07:30:37.333824 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 07:30:37.334458 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 07:30:38.235976 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 07:30:37.334716 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 07:30:38.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:37.335134 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 07:30:37.335242 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 07:30:37.335370 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T07:30:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 07:30:38.237479 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 07:30:38.237694 systemd[1]: Finished modprobe@drm.service. Dec 13 07:30:38.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.238732 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 07:30:38.238934 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 07:30:38.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.240214 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 07:30:38.241454 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 07:30:38.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.242003 systemd[1]: Finished modprobe@fuse.service. Dec 13 07:30:38.243018 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 07:30:38.243312 systemd[1]: Finished modprobe@loop.service. Dec 13 07:30:38.244280 systemd[1]: Finished systemd-modules-load.service. Dec 13 07:30:38.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.245394 systemd[1]: Finished systemd-network-generator.service. Dec 13 07:30:38.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.246419 systemd[1]: Finished systemd-remount-fs.service. Dec 13 07:30:38.248029 systemd[1]: Reached target network-pre.target. Dec 13 07:30:38.250969 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 07:30:38.256917 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 07:30:38.260243 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 07:30:38.269364 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 07:30:38.275696 systemd[1]: Starting systemd-journal-flush.service... Dec 13 07:30:38.276595 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 07:30:38.278662 systemd[1]: Starting systemd-random-seed.service... Dec 13 07:30:38.280014 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 07:30:38.282528 systemd[1]: Starting systemd-sysctl.service... Dec 13 07:30:38.286556 systemd[1]: Starting systemd-sysusers.service... Dec 13 07:30:38.290551 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 07:30:38.291345 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 07:30:38.299340 systemd-journald[979]: Time spent on flushing to /var/log/journal/385cb86b28904551859053a4ab985f5d is 34.832ms for 1287 entries. Dec 13 07:30:38.299340 systemd-journald[979]: System Journal (/var/log/journal/385cb86b28904551859053a4ab985f5d) is 8.0M, max 584.8M, 576.8M free. Dec 13 07:30:38.342856 systemd-journald[979]: Received client request to flush runtime journal. Dec 13 07:30:38.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.303511 systemd[1]: Finished systemd-random-seed.service. Dec 13 07:30:38.304316 systemd[1]: Reached target first-boot-complete.target. Dec 13 07:30:38.323972 systemd[1]: Finished systemd-sysctl.service. Dec 13 07:30:38.344271 systemd[1]: Finished systemd-journal-flush.service. Dec 13 07:30:38.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.350720 systemd[1]: Finished systemd-sysusers.service. Dec 13 07:30:38.405703 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 07:30:38.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.408608 systemd[1]: Starting systemd-udev-settle.service... Dec 13 07:30:38.420901 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 07:30:38.979773 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 07:30:38.987408 kernel: kauditd_printk_skb: 100 callbacks suppressed Dec 13 07:30:38.987515 kernel: audit: type=1130 audit(1734075038.980:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:38.989410 kernel: audit: type=1334 audit(1734075038.987:141): prog-id=21 op=LOAD Dec 13 07:30:38.987000 audit: BPF prog-id=21 op=LOAD Dec 13 07:30:38.988684 systemd[1]: Starting systemd-udevd.service... Dec 13 07:30:38.987000 audit: BPF prog-id=22 op=LOAD Dec 13 07:30:38.987000 audit: BPF prog-id=7 op=UNLOAD Dec 13 07:30:38.987000 audit: BPF prog-id=8 op=UNLOAD Dec 13 07:30:38.995019 kernel: audit: type=1334 audit(1734075038.987:142): prog-id=22 op=LOAD Dec 13 07:30:38.995099 kernel: audit: type=1334 audit(1734075038.987:143): prog-id=7 op=UNLOAD Dec 13 07:30:38.995150 kernel: audit: type=1334 audit(1734075038.987:144): prog-id=8 op=UNLOAD Dec 13 07:30:39.018242 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Dec 13 07:30:39.050548 systemd[1]: Started systemd-udevd.service. Dec 13 07:30:39.062253 kernel: audit: type=1130 audit(1734075039.051:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.053000 audit: BPF prog-id=23 op=LOAD Dec 13 07:30:39.067118 kernel: audit: type=1334 audit(1734075039.053:146): prog-id=23 op=LOAD Dec 13 07:30:39.063345 systemd[1]: Starting systemd-networkd.service... Dec 13 07:30:39.086359 kernel: audit: type=1334 audit(1734075039.078:147): prog-id=24 op=LOAD Dec 13 07:30:39.086467 kernel: audit: type=1334 audit(1734075039.078:148): prog-id=25 op=LOAD Dec 13 07:30:39.086658 kernel: audit: type=1334 audit(1734075039.078:149): prog-id=26 op=LOAD Dec 13 07:30:39.078000 audit: BPF prog-id=24 op=LOAD Dec 13 07:30:39.078000 audit: BPF prog-id=25 op=LOAD Dec 13 07:30:39.078000 audit: BPF prog-id=26 op=LOAD Dec 13 07:30:39.083611 systemd[1]: Starting systemd-userdbd.service... Dec 13 07:30:39.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.137284 systemd[1]: Started systemd-userdbd.service. Dec 13 07:30:39.183001 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 07:30:39.232867 systemd-networkd[1021]: lo: Link UP Dec 13 07:30:39.232882 systemd-networkd[1021]: lo: Gained carrier Dec 13 07:30:39.234380 systemd-networkd[1021]: Enumeration completed Dec 13 07:30:39.234530 systemd[1]: Started systemd-networkd.service. Dec 13 07:30:39.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.237701 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 07:30:39.239958 systemd-networkd[1021]: eth0: Link UP Dec 13 07:30:39.239971 systemd-networkd[1021]: eth0: Gained carrier Dec 13 07:30:39.254304 systemd-networkd[1021]: eth0: DHCPv4 address 10.230.40.198/30, gateway 10.230.40.197 acquired from 10.230.40.197 Dec 13 07:30:39.261364 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 07:30:39.269121 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 07:30:39.280137 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 07:30:39.287127 kernel: ACPI: button: Power Button [PWRF] Dec 13 07:30:39.339000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 07:30:39.339000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555f176ee0f0 a1=337fc a2=7f83a7658bc5 a3=5 items=110 ppid=1013 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:30:39.339000 audit: CWD cwd="/" Dec 13 07:30:39.339000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=1 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=2 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=3 name=(null) inode=14143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=4 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=5 name=(null) inode=14144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=6 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=7 name=(null) inode=14145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=8 name=(null) inode=14145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=9 name=(null) inode=14146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=10 name=(null) inode=14145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=11 name=(null) inode=14147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=12 name=(null) inode=14145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=13 name=(null) inode=14148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=14 name=(null) inode=14145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=15 name=(null) inode=14149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=16 name=(null) inode=14145 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=17 name=(null) inode=14150 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=18 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=19 name=(null) inode=14151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=20 name=(null) inode=14151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=21 name=(null) inode=14152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=22 name=(null) inode=14151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=23 name=(null) inode=14153 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=24 name=(null) inode=14151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=25 name=(null) inode=14154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=26 name=(null) inode=14151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=27 name=(null) inode=14155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=28 name=(null) inode=14151 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=29 name=(null) inode=14156 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=30 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=31 name=(null) inode=14157 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=32 name=(null) inode=14157 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=33 name=(null) inode=14158 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=34 name=(null) inode=14157 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=35 name=(null) inode=14159 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=36 name=(null) inode=14157 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=37 name=(null) inode=14160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=38 name=(null) inode=14157 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=39 name=(null) inode=14161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=40 name=(null) inode=14157 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=41 name=(null) inode=14162 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=42 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=43 name=(null) inode=14163 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=44 name=(null) inode=14163 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=45 name=(null) inode=14164 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=46 name=(null) inode=14163 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=47 name=(null) inode=14165 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=48 name=(null) inode=14163 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=49 name=(null) inode=14166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=50 name=(null) inode=14163 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=51 name=(null) inode=14167 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=52 name=(null) inode=14163 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=53 name=(null) inode=14168 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=55 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=56 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=57 name=(null) inode=14170 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=58 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=59 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=60 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=61 name=(null) inode=14172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=62 name=(null) inode=14172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=63 name=(null) inode=14173 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=64 name=(null) inode=14172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=65 name=(null) inode=14174 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=66 name=(null) inode=14172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=67 name=(null) inode=14175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=68 name=(null) inode=14172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=69 name=(null) inode=14176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=70 name=(null) inode=14172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=71 name=(null) inode=14177 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=72 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=73 name=(null) inode=14178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=74 name=(null) inode=14178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=75 name=(null) inode=14179 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=76 name=(null) inode=14178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=77 name=(null) inode=14180 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=78 name=(null) inode=14178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=79 name=(null) inode=14181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=80 name=(null) inode=14178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=81 name=(null) inode=14182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=82 name=(null) inode=14178 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=83 name=(null) inode=14183 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=84 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=85 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=86 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=87 name=(null) inode=14185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=88 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=89 name=(null) inode=14186 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=90 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=91 name=(null) inode=14187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=92 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=93 name=(null) inode=14188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=94 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=95 name=(null) inode=14189 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=96 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=97 name=(null) inode=14190 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=98 name=(null) inode=14190 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=99 name=(null) inode=14191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=100 name=(null) inode=14190 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=101 name=(null) inode=14192 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=102 name=(null) inode=14190 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=103 name=(null) inode=14193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=104 name=(null) inode=14190 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=105 name=(null) inode=14194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=106 name=(null) inode=14190 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=107 name=(null) inode=14195 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PATH item=109 name=(null) inode=14196 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:30:39.339000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 07:30:39.411155 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 07:30:39.427436 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 07:30:39.438724 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 07:30:39.439064 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 07:30:39.560996 systemd[1]: Finished systemd-udev-settle.service. Dec 13 07:30:39.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.564361 systemd[1]: Starting lvm2-activation-early.service... Dec 13 07:30:39.610668 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 07:30:39.644642 systemd[1]: Finished lvm2-activation-early.service. Dec 13 07:30:39.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.645560 systemd[1]: Reached target cryptsetup.target. Dec 13 07:30:39.648078 systemd[1]: Starting lvm2-activation.service... Dec 13 07:30:39.654041 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 07:30:39.683650 systemd[1]: Finished lvm2-activation.service. Dec 13 07:30:39.684539 systemd[1]: Reached target local-fs-pre.target. Dec 13 07:30:39.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.685175 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 07:30:39.685221 systemd[1]: Reached target local-fs.target. Dec 13 07:30:39.685931 systemd[1]: Reached target machines.target. Dec 13 07:30:39.688584 systemd[1]: Starting ldconfig.service... Dec 13 07:30:39.689953 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 07:30:39.690017 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 07:30:39.692186 systemd[1]: Starting systemd-boot-update.service... Dec 13 07:30:39.695369 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 07:30:39.701190 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 07:30:39.704838 systemd[1]: Starting systemd-sysext.service... Dec 13 07:30:39.718953 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Dec 13 07:30:39.720982 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 07:30:39.804755 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 07:30:39.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.817063 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 07:30:39.881085 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 07:30:39.881353 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 07:30:39.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.887405 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 07:30:39.889355 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 07:30:39.901146 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 07:30:39.927384 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 07:30:39.949243 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 07:30:39.968731 (sd-sysext)[1057]: Using extensions 'kubernetes'. Dec 13 07:30:39.970901 (sd-sysext)[1057]: Merged extensions into '/usr'. Dec 13 07:30:39.982996 systemd-fsck[1054]: fsck.fat 4.2 (2021-01-31) Dec 13 07:30:39.982996 systemd-fsck[1054]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 07:30:39.985375 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 07:30:39.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:39.990509 systemd[1]: Mounting boot.mount... Dec 13 07:30:40.011300 systemd[1]: Mounted boot.mount. Dec 13 07:30:40.012487 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 07:30:40.014857 systemd[1]: Mounting usr-share-oem.mount... Dec 13 07:30:40.018451 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.021544 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 07:30:40.025766 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 07:30:40.029592 systemd[1]: Starting modprobe@loop.service... Dec 13 07:30:40.030387 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.030613 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 07:30:40.030936 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 07:30:40.033677 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 07:30:40.033917 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 07:30:40.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.036252 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 07:30:40.036446 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 07:30:40.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.037555 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 07:30:40.041936 systemd[1]: Mounted usr-share-oem.mount. Dec 13 07:30:40.043679 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 07:30:40.043883 systemd[1]: Finished modprobe@loop.service. Dec 13 07:30:40.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.045952 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.046465 systemd[1]: Finished systemd-sysext.service. Dec 13 07:30:40.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.049209 systemd[1]: Starting ensure-sysext.service... Dec 13 07:30:40.052009 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 07:30:40.064929 systemd[1]: Reloading. Dec 13 07:30:40.096324 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 07:30:40.107986 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 07:30:40.123418 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 07:30:40.203197 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2024-12-13T07:30:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 07:30:40.203257 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2024-12-13T07:30:40Z" level=info msg="torcx already run" Dec 13 07:30:40.326502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 07:30:40.326535 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 07:30:40.353068 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 07:30:40.371383 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 07:30:40.433000 audit: BPF prog-id=27 op=LOAD Dec 13 07:30:40.433000 audit: BPF prog-id=28 op=LOAD Dec 13 07:30:40.433000 audit: BPF prog-id=21 op=UNLOAD Dec 13 07:30:40.433000 audit: BPF prog-id=22 op=UNLOAD Dec 13 07:30:40.433000 audit: BPF prog-id=29 op=LOAD Dec 13 07:30:40.434000 audit: BPF prog-id=23 op=UNLOAD Dec 13 07:30:40.435000 audit: BPF prog-id=30 op=LOAD Dec 13 07:30:40.435000 audit: BPF prog-id=18 op=UNLOAD Dec 13 07:30:40.435000 audit: BPF prog-id=31 op=LOAD Dec 13 07:30:40.435000 audit: BPF prog-id=32 op=LOAD Dec 13 07:30:40.435000 audit: BPF prog-id=19 op=UNLOAD Dec 13 07:30:40.435000 audit: BPF prog-id=20 op=UNLOAD Dec 13 07:30:40.439000 audit: BPF prog-id=33 op=LOAD Dec 13 07:30:40.439000 audit: BPF prog-id=24 op=UNLOAD Dec 13 07:30:40.439000 audit: BPF prog-id=34 op=LOAD Dec 13 07:30:40.439000 audit: BPF prog-id=35 op=LOAD Dec 13 07:30:40.439000 audit: BPF prog-id=25 op=UNLOAD Dec 13 07:30:40.439000 audit: BPF prog-id=26 op=UNLOAD Dec 13 07:30:40.450592 systemd[1]: Finished ldconfig.service. Dec 13 07:30:40.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.453544 systemd[1]: Finished systemd-boot-update.service. Dec 13 07:30:40.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.469227 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.471243 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 07:30:40.474176 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 07:30:40.476450 systemd[1]: Starting modprobe@loop.service... Dec 13 07:30:40.477973 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.478176 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 07:30:40.479482 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 07:30:40.479708 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 07:30:40.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.481245 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 07:30:40.481448 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 07:30:40.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.482954 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 07:30:40.483300 systemd[1]: Finished modprobe@loop.service. Dec 13 07:30:40.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.488779 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 07:30:40.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.505386 systemd[1]: Finished ensure-sysext.service. Dec 13 07:30:40.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.508887 systemd[1]: Starting audit-rules.service... Dec 13 07:30:40.511019 systemd[1]: Starting clean-ca-certificates.service... Dec 13 07:30:40.512489 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.514908 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 07:30:40.518276 systemd[1]: Starting modprobe@drm.service... Dec 13 07:30:40.522276 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 07:30:40.527652 systemd[1]: Starting modprobe@loop.service... Dec 13 07:30:40.529968 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.530352 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 07:30:40.533380 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 07:30:40.537334 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 07:30:40.539000 audit: BPF prog-id=36 op=LOAD Dec 13 07:30:40.540675 systemd[1]: Starting systemd-resolved.service... Dec 13 07:30:40.544000 audit: BPF prog-id=37 op=LOAD Dec 13 07:30:40.548302 systemd[1]: Starting systemd-timesyncd.service... Dec 13 07:30:40.551554 systemd[1]: Starting systemd-update-utmp.service... Dec 13 07:30:40.555989 systemd[1]: Finished clean-ca-certificates.service. Dec 13 07:30:40.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.557040 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 07:30:40.557263 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 07:30:40.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.558000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.558922 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 07:30:40.560608 systemd[1]: Finished modprobe@drm.service. Dec 13 07:30:40.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.561626 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 07:30:40.561819 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 07:30:40.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.563614 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 07:30:40.563787 systemd[1]: Finished modprobe@loop.service. Dec 13 07:30:40.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.569681 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 07:30:40.569842 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 07:30:40.569968 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 07:30:40.572472 systemd[1]: Finished systemd-update-utmp.service. Dec 13 07:30:40.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.620371 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 07:30:40.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.623570 systemd[1]: Starting systemd-update-done.service... Dec 13 07:30:40.638633 systemd[1]: Finished systemd-update-done.service. Dec 13 07:30:40.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:30:40.645000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 07:30:40.645000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6761f880 a2=420 a3=0 items=0 ppid=1135 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:30:40.645000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 07:30:40.646174 augenrules[1160]: No rules Dec 13 07:30:40.646449 systemd[1]: Finished audit-rules.service. Dec 13 07:30:40.671305 systemd-resolved[1144]: Positive Trust Anchors: Dec 13 07:30:40.671781 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 07:30:40.671930 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 07:30:40.678390 systemd[1]: Started systemd-timesyncd.service. Dec 13 07:30:40.679233 systemd[1]: Reached target time-set.target. Dec 13 07:30:40.680170 systemd-resolved[1144]: Using system hostname 'srv-9sek4.gb1.brightbox.com'. Dec 13 07:30:40.682869 systemd-networkd[1021]: eth0: Gained IPv6LL Dec 13 07:30:40.685029 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 07:30:40.686179 systemd[1]: Started systemd-resolved.service. Dec 13 07:30:40.686871 systemd[1]: Reached target network.target. Dec 13 07:30:40.687440 systemd[1]: Reached target network-online.target. Dec 13 07:30:40.688039 systemd[1]: Reached target nss-lookup.target. Dec 13 07:30:40.688776 systemd[1]: Reached target sysinit.target. Dec 13 07:30:40.689504 systemd[1]: Started motdgen.path. Dec 13 07:30:40.690079 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 07:30:40.690965 systemd[1]: Started logrotate.timer. Dec 13 07:30:40.691641 systemd[1]: Started mdadm.timer. Dec 13 07:30:40.692197 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 07:30:40.692787 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 07:30:40.692844 systemd[1]: Reached target paths.target. Dec 13 07:30:40.693449 systemd[1]: Reached target timers.target. Dec 13 07:30:40.694414 systemd[1]: Listening on dbus.socket. Dec 13 07:30:40.696732 systemd[1]: Starting docker.socket... Dec 13 07:30:41.433979 systemd-resolved[1144]: Clock change detected. Flushing caches. Dec 13 07:30:41.434188 systemd-timesyncd[1145]: Contacted time server 178.79.155.116:123 (0.flatcar.pool.ntp.org). Dec 13 07:30:41.434668 systemd-timesyncd[1145]: Initial clock synchronization to Fri 2024-12-13 07:30:41.433899 UTC. Dec 13 07:30:41.436419 systemd[1]: Listening on sshd.socket. Dec 13 07:30:41.437364 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 07:30:41.438059 systemd[1]: Listening on docker.socket. Dec 13 07:30:41.438995 systemd[1]: Reached target sockets.target. Dec 13 07:30:41.439611 systemd[1]: Reached target basic.target. Dec 13 07:30:41.440287 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 07:30:41.440341 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 07:30:41.442111 systemd[1]: Starting containerd.service... Dec 13 07:30:41.445523 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 07:30:41.447764 systemd[1]: Starting dbus.service... Dec 13 07:30:41.450716 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 07:30:41.454010 systemd[1]: Starting extend-filesystems.service... Dec 13 07:30:41.454859 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 07:30:41.461933 systemd[1]: Starting kubelet.service... Dec 13 07:30:41.464979 systemd[1]: Starting motdgen.service... Dec 13 07:30:41.482430 jq[1174]: false Dec 13 07:30:41.485987 systemd[1]: Starting prepare-helm.service... Dec 13 07:30:41.489455 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 07:30:41.492669 systemd[1]: Starting sshd-keygen.service... Dec 13 07:30:41.501127 systemd[1]: Starting systemd-logind.service... Dec 13 07:30:41.501908 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 07:30:41.502145 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 07:30:41.509549 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 07:30:41.517407 systemd[1]: Starting update-engine.service... Dec 13 07:30:41.519960 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 07:30:41.524101 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 07:30:41.524423 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 07:30:41.531881 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 07:30:41.532179 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 07:30:41.542747 jq[1192]: true Dec 13 07:30:41.551382 extend-filesystems[1175]: Found loop1 Dec 13 07:30:41.559291 tar[1197]: linux-amd64/helm Dec 13 07:30:41.560906 extend-filesystems[1175]: Found vda Dec 13 07:30:41.561885 extend-filesystems[1175]: Found vda1 Dec 13 07:30:41.562934 extend-filesystems[1175]: Found vda2 Dec 13 07:30:41.563805 extend-filesystems[1175]: Found vda3 Dec 13 07:30:41.565805 extend-filesystems[1175]: Found usr Dec 13 07:30:41.565805 extend-filesystems[1175]: Found vda4 Dec 13 07:30:41.565805 extend-filesystems[1175]: Found vda6 Dec 13 07:30:41.565805 extend-filesystems[1175]: Found vda7 Dec 13 07:30:41.565805 extend-filesystems[1175]: Found vda9 Dec 13 07:30:41.565805 extend-filesystems[1175]: Checking size of /dev/vda9 Dec 13 07:30:41.598424 jq[1200]: true Dec 13 07:30:41.601369 dbus-daemon[1171]: [system] SELinux support is enabled Dec 13 07:30:41.601634 systemd[1]: Started dbus.service. Dec 13 07:30:41.604876 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 07:30:41.604926 systemd[1]: Reached target system-config.target. Dec 13 07:30:41.605583 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 07:30:41.605627 systemd[1]: Reached target user-config.target. Dec 13 07:30:41.612566 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 07:30:41.612809 systemd[1]: Finished motdgen.service. Dec 13 07:30:41.615380 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 07:30:41.615426 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 07:30:41.620162 dbus-daemon[1171]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1021 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 07:30:41.624489 dbus-daemon[1171]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 07:30:41.629291 systemd[1]: Starting systemd-hostnamed.service... Dec 13 07:30:41.633139 extend-filesystems[1175]: Resized partition /dev/vda9 Dec 13 07:30:41.662947 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 07:30:41.673607 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 07:30:41.725904 update_engine[1189]: I1213 07:30:41.719913 1189 main.cc:92] Flatcar Update Engine starting Dec 13 07:30:41.727988 systemd[1]: Started update-engine.service. Dec 13 07:30:41.728400 update_engine[1189]: I1213 07:30:41.728076 1189 update_check_scheduler.cc:74] Next update check in 4m27s Dec 13 07:30:41.732044 systemd[1]: Started locksmithd.service. Dec 13 07:30:41.766302 env[1198]: time="2024-12-13T07:30:41.766163003Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 07:30:41.789499 bash[1228]: Updated "/home/core/.ssh/authorized_keys" Dec 13 07:30:41.790432 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 07:30:41.797576 systemd-logind[1185]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 07:30:41.798117 systemd-logind[1185]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 07:30:41.800868 systemd-logind[1185]: New seat seat0. Dec 13 07:30:41.807935 systemd[1]: Started systemd-logind.service. Dec 13 07:30:41.846907 env[1198]: time="2024-12-13T07:30:41.846820248Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 07:30:41.847098 env[1198]: time="2024-12-13T07:30:41.847044651Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 07:30:41.859807 env[1198]: time="2024-12-13T07:30:41.859728447Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 07:30:41.859807 env[1198]: time="2024-12-13T07:30:41.859801668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 07:30:41.860163 env[1198]: time="2024-12-13T07:30:41.860125857Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 07:30:41.860163 env[1198]: time="2024-12-13T07:30:41.860159600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 07:30:41.860304 env[1198]: time="2024-12-13T07:30:41.860180650Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 07:30:41.860304 env[1198]: time="2024-12-13T07:30:41.860197525Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 07:30:41.860394 env[1198]: time="2024-12-13T07:30:41.860314891Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 07:30:41.860762 env[1198]: time="2024-12-13T07:30:41.860731711Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 07:30:41.860940 env[1198]: time="2024-12-13T07:30:41.860906246Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 07:30:41.861018 env[1198]: time="2024-12-13T07:30:41.860939435Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 07:30:41.861074 env[1198]: time="2024-12-13T07:30:41.861012551Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 07:30:41.861074 env[1198]: time="2024-12-13T07:30:41.861035393Z" level=info msg="metadata content store policy set" policy=shared Dec 13 07:30:41.899805 dbus-daemon[1171]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 07:30:41.899971 systemd[1]: Started systemd-hostnamed.service. Dec 13 07:30:41.901877 dbus-daemon[1171]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1220 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 07:30:41.910998 systemd[1]: Starting polkit.service... Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.917741352Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.917831517Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.917855455Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.917937207Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.917970570Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918057997Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918079305Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918099372Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918117628Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918142074Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918165211Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.918313 env[1198]: time="2024-12-13T07:30:41.918192479Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 07:30:41.919018 env[1198]: time="2024-12-13T07:30:41.918384653Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 07:30:41.919018 env[1198]: time="2024-12-13T07:30:41.918548912Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 07:30:41.919018 env[1198]: time="2024-12-13T07:30:41.918951329Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 07:30:41.919018 env[1198]: time="2024-12-13T07:30:41.919000975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919222 env[1198]: time="2024-12-13T07:30:41.919031341Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 07:30:41.919222 env[1198]: time="2024-12-13T07:30:41.919122399Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919222 env[1198]: time="2024-12-13T07:30:41.919146276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919257914Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919287664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919307959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919326352Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919345196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919362756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919386 env[1198]: time="2024-12-13T07:30:41.919382916Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 07:30:41.919698 env[1198]: time="2024-12-13T07:30:41.919584594Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919698 env[1198]: time="2024-12-13T07:30:41.919675654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919883 env[1198]: time="2024-12-13T07:30:41.919697813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.919883 env[1198]: time="2024-12-13T07:30:41.919715029Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 07:30:41.919883 env[1198]: time="2024-12-13T07:30:41.919737797Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 07:30:41.919883 env[1198]: time="2024-12-13T07:30:41.919758062Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 07:30:41.919883 env[1198]: time="2024-12-13T07:30:41.919841409Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 07:30:41.920146 env[1198]: time="2024-12-13T07:30:41.919905144Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 07:30:41.920241 env[1198]: time="2024-12-13T07:30:41.920157793Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 07:30:41.923303 env[1198]: time="2024-12-13T07:30:41.920241342Z" level=info msg="Connect containerd service" Dec 13 07:30:41.923303 env[1198]: time="2024-12-13T07:30:41.920303315Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 07:30:41.926405 env[1198]: time="2024-12-13T07:30:41.926309263Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.926588098Z" level=info msg="Start subscribing containerd event" Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.926707741Z" level=info msg="Start recovering state" Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.926854625Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.926919272Z" level=info msg="Start event monitor" Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.926946984Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.926992912Z" level=info msg="Start snapshots syncer" Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.927013251Z" level=info msg="Start cni network conf syncer for default" Dec 13 07:30:41.928761 env[1198]: time="2024-12-13T07:30:41.927033703Z" level=info msg="Start streaming server" Dec 13 07:30:41.927159 systemd[1]: Started containerd.service. Dec 13 07:30:41.929655 env[1198]: time="2024-12-13T07:30:41.929544087Z" level=info msg="containerd successfully booted in 0.166904s" Dec 13 07:30:41.941837 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 07:30:41.950077 polkitd[1234]: Started polkitd version 121 Dec 13 07:30:41.970276 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 07:30:41.970837 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 07:30:41.970837 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 07:30:41.970837 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 07:30:41.970528 systemd[1]: Finished extend-filesystems.service. Dec 13 07:30:41.978374 extend-filesystems[1175]: Resized filesystem in /dev/vda9 Dec 13 07:30:41.980562 polkitd[1234]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 07:30:41.980671 polkitd[1234]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 07:30:41.984430 polkitd[1234]: Finished loading, compiling and executing 2 rules Dec 13 07:30:41.986517 dbus-daemon[1171]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 07:30:41.986719 systemd[1]: Started polkit.service. Dec 13 07:30:41.988056 polkitd[1234]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 07:30:42.014982 systemd-hostnamed[1220]: Hostname set to (static) Dec 13 07:30:42.436722 tar[1197]: linux-amd64/LICENSE Dec 13 07:30:42.437011 tar[1197]: linux-amd64/README.md Dec 13 07:30:42.442995 systemd[1]: Finished prepare-helm.service. Dec 13 07:30:42.576146 locksmithd[1229]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 07:30:42.675401 systemd[1]: Created slice system-sshd.slice. Dec 13 07:30:42.679608 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 07:30:42.727959 systemd[1]: Finished sshd-keygen.service. Dec 13 07:30:42.732034 systemd[1]: Starting issuegen.service... Dec 13 07:30:42.735495 systemd[1]: Started sshd@0-10.230.40.198:22-139.178.89.65:54562.service. Dec 13 07:30:42.744900 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 07:30:42.745156 systemd[1]: Finished issuegen.service. Dec 13 07:30:42.747934 systemd[1]: Starting systemd-user-sessions.service... Dec 13 07:30:42.759080 systemd[1]: Finished systemd-user-sessions.service. Dec 13 07:30:42.762161 systemd[1]: Started getty@tty1.service. Dec 13 07:30:42.766602 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 07:30:42.767796 systemd[1]: Reached target getty.target. Dec 13 07:30:43.042210 systemd[1]: Started kubelet.service. Dec 13 07:30:43.130117 systemd-networkd[1021]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8a31:24:19ff:fee6:28c6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8a31:24:19ff:fee6:28c6/64 assigned by NDisc. Dec 13 07:30:43.130130 systemd-networkd[1021]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 07:30:43.669099 sshd[1256]: Accepted publickey for core from 139.178.89.65 port 54562 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:30:43.671559 sshd[1256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:30:43.691889 systemd[1]: Created slice user-500.slice. Dec 13 07:30:43.701191 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 07:30:43.708869 systemd-logind[1185]: New session 1 of user core. Dec 13 07:30:43.724100 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 07:30:43.727893 systemd[1]: Starting user@500.service... Dec 13 07:30:43.737546 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:30:43.872719 systemd[1274]: Queued start job for default target default.target. Dec 13 07:30:43.874081 systemd[1274]: Reached target paths.target. Dec 13 07:30:43.874117 systemd[1274]: Reached target sockets.target. Dec 13 07:30:43.874136 systemd[1274]: Reached target timers.target. Dec 13 07:30:43.874155 systemd[1274]: Reached target basic.target. Dec 13 07:30:43.874218 systemd[1274]: Reached target default.target. Dec 13 07:30:43.874266 systemd[1274]: Startup finished in 123ms. Dec 13 07:30:43.874303 systemd[1]: Started user@500.service. Dec 13 07:30:43.876635 systemd[1]: Started session-1.scope. Dec 13 07:30:43.885464 kubelet[1265]: E1213 07:30:43.885000 1265 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 07:30:43.887543 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 07:30:43.887931 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 07:30:43.888365 systemd[1]: kubelet.service: Consumed 1.114s CPU time. Dec 13 07:30:44.506241 systemd[1]: Started sshd@1-10.230.40.198:22-139.178.89.65:54576.service. Dec 13 07:30:45.420809 sshd[1283]: Accepted publickey for core from 139.178.89.65 port 54576 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:30:45.423924 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:30:45.431294 systemd[1]: Started session-2.scope. Dec 13 07:30:45.434676 systemd-logind[1185]: New session 2 of user core. Dec 13 07:30:46.043221 sshd[1283]: pam_unix(sshd:session): session closed for user core Dec 13 07:30:46.046990 systemd[1]: sshd@1-10.230.40.198:22-139.178.89.65:54576.service: Deactivated successfully. Dec 13 07:30:46.047985 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 07:30:46.048706 systemd-logind[1185]: Session 2 logged out. Waiting for processes to exit. Dec 13 07:30:46.049816 systemd-logind[1185]: Removed session 2. Dec 13 07:30:46.190050 systemd[1]: Started sshd@2-10.230.40.198:22-139.178.89.65:54584.service. Dec 13 07:30:47.084969 sshd[1290]: Accepted publickey for core from 139.178.89.65 port 54584 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:30:47.087670 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:30:47.095658 systemd-logind[1185]: New session 3 of user core. Dec 13 07:30:47.095869 systemd[1]: Started session-3.scope. Dec 13 07:30:47.704741 sshd[1290]: pam_unix(sshd:session): session closed for user core Dec 13 07:30:47.708649 systemd-logind[1185]: Session 3 logged out. Waiting for processes to exit. Dec 13 07:30:47.709126 systemd[1]: sshd@2-10.230.40.198:22-139.178.89.65:54584.service: Deactivated successfully. Dec 13 07:30:47.710046 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 07:30:47.711104 systemd-logind[1185]: Removed session 3. Dec 13 07:30:48.606409 coreos-metadata[1170]: Dec 13 07:30:48.606 WARN failed to locate config-drive, using the metadata service API instead Dec 13 07:30:48.658653 coreos-metadata[1170]: Dec 13 07:30:48.658 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 07:30:48.683450 coreos-metadata[1170]: Dec 13 07:30:48.683 INFO Fetch successful Dec 13 07:30:48.683790 coreos-metadata[1170]: Dec 13 07:30:48.683 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 07:30:48.724080 coreos-metadata[1170]: Dec 13 07:30:48.724 INFO Fetch successful Dec 13 07:30:48.726035 unknown[1170]: wrote ssh authorized keys file for user: core Dec 13 07:30:48.738228 update-ssh-keys[1297]: Updated "/home/core/.ssh/authorized_keys" Dec 13 07:30:48.739356 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 07:30:48.739926 systemd[1]: Reached target multi-user.target. Dec 13 07:30:48.741993 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 07:30:48.752179 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 07:30:48.752464 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 07:30:48.752921 systemd[1]: Startup finished in 1.137s (kernel) + 6.642s (initrd) + 13.671s (userspace) = 21.452s. Dec 13 07:30:53.988737 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 07:30:53.989130 systemd[1]: Stopped kubelet.service. Dec 13 07:30:53.989234 systemd[1]: kubelet.service: Consumed 1.114s CPU time. Dec 13 07:30:53.991547 systemd[1]: Starting kubelet.service... Dec 13 07:30:54.157890 systemd[1]: Started kubelet.service. Dec 13 07:30:54.269546 kubelet[1303]: E1213 07:30:54.269348 1303 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 07:30:54.273601 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 07:30:54.273887 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 07:30:57.855261 systemd[1]: Started sshd@3-10.230.40.198:22-139.178.89.65:41726.service. Dec 13 07:30:58.754951 sshd[1310]: Accepted publickey for core from 139.178.89.65 port 41726 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:30:58.757729 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:30:58.764402 systemd-logind[1185]: New session 4 of user core. Dec 13 07:30:58.765119 systemd[1]: Started session-4.scope. Dec 13 07:30:59.380895 sshd[1310]: pam_unix(sshd:session): session closed for user core Dec 13 07:30:59.384521 systemd[1]: sshd@3-10.230.40.198:22-139.178.89.65:41726.service: Deactivated successfully. Dec 13 07:30:59.385421 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 07:30:59.386280 systemd-logind[1185]: Session 4 logged out. Waiting for processes to exit. Dec 13 07:30:59.387614 systemd-logind[1185]: Removed session 4. Dec 13 07:30:59.528276 systemd[1]: Started sshd@4-10.230.40.198:22-139.178.89.65:56908.service. Dec 13 07:31:00.421316 sshd[1316]: Accepted publickey for core from 139.178.89.65 port 56908 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:31:00.423907 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:31:00.431545 systemd-logind[1185]: New session 5 of user core. Dec 13 07:31:00.431700 systemd[1]: Started session-5.scope. Dec 13 07:31:01.035579 sshd[1316]: pam_unix(sshd:session): session closed for user core Dec 13 07:31:01.039263 systemd[1]: sshd@4-10.230.40.198:22-139.178.89.65:56908.service: Deactivated successfully. Dec 13 07:31:01.040264 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 07:31:01.041192 systemd-logind[1185]: Session 5 logged out. Waiting for processes to exit. Dec 13 07:31:01.042741 systemd-logind[1185]: Removed session 5. Dec 13 07:31:01.182954 systemd[1]: Started sshd@5-10.230.40.198:22-139.178.89.65:56912.service. Dec 13 07:31:02.078113 sshd[1322]: Accepted publickey for core from 139.178.89.65 port 56912 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:31:02.081292 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:31:02.088811 systemd-logind[1185]: New session 6 of user core. Dec 13 07:31:02.090047 systemd[1]: Started session-6.scope. Dec 13 07:31:02.702277 sshd[1322]: pam_unix(sshd:session): session closed for user core Dec 13 07:31:02.706288 systemd[1]: sshd@5-10.230.40.198:22-139.178.89.65:56912.service: Deactivated successfully. Dec 13 07:31:02.707274 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 07:31:02.708124 systemd-logind[1185]: Session 6 logged out. Waiting for processes to exit. Dec 13 07:31:02.709651 systemd-logind[1185]: Removed session 6. Dec 13 07:31:02.850301 systemd[1]: Started sshd@6-10.230.40.198:22-139.178.89.65:56926.service. Dec 13 07:31:03.745321 sshd[1328]: Accepted publickey for core from 139.178.89.65 port 56926 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:31:03.747817 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:31:03.754069 systemd-logind[1185]: New session 7 of user core. Dec 13 07:31:03.755042 systemd[1]: Started session-7.scope. Dec 13 07:31:04.237430 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 07:31:04.238964 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 07:31:04.251074 dbus-daemon[1171]: НXL\x89U: received setenforce notice (enforcing=465396864) Dec 13 07:31:04.253690 sudo[1331]: pam_unix(sudo:session): session closed for user root Dec 13 07:31:04.398954 sshd[1328]: pam_unix(sshd:session): session closed for user core Dec 13 07:31:04.403307 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 07:31:04.404413 systemd[1]: sshd@6-10.230.40.198:22-139.178.89.65:56926.service: Deactivated successfully. Dec 13 07:31:04.404631 systemd-logind[1185]: Session 7 logged out. Waiting for processes to exit. Dec 13 07:31:04.405301 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 07:31:04.405743 systemd[1]: Stopped kubelet.service. Dec 13 07:31:04.408006 systemd[1]: Starting kubelet.service... Dec 13 07:31:04.409867 systemd-logind[1185]: Removed session 7. Dec 13 07:31:04.531053 systemd[1]: Started kubelet.service. Dec 13 07:31:04.544396 systemd[1]: Started sshd@7-10.230.40.198:22-139.178.89.65:56938.service. Dec 13 07:31:04.619177 kubelet[1338]: E1213 07:31:04.619098 1338 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 07:31:04.621540 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 07:31:04.621739 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 07:31:05.433917 sshd[1344]: Accepted publickey for core from 139.178.89.65 port 56938 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:31:05.435873 sshd[1344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:31:05.443473 systemd[1]: Started session-8.scope. Dec 13 07:31:05.444221 systemd-logind[1185]: New session 8 of user core. Dec 13 07:31:05.938468 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 07:31:05.938847 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 07:31:05.943704 sudo[1350]: pam_unix(sudo:session): session closed for user root Dec 13 07:31:05.951621 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 07:31:05.952546 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 07:31:05.969016 systemd[1]: Stopping audit-rules.service... Dec 13 07:31:05.967000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 07:31:05.971126 kernel: kauditd_printk_skb: 175 callbacks suppressed Dec 13 07:31:05.971330 kernel: audit: type=1305 audit(1734075065.967:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 07:31:05.972278 auditctl[1353]: No rules Dec 13 07:31:05.976188 kernel: audit: type=1300 audit(1734075065.967:210): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4cbf24f0 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:05.967000 audit[1353]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4cbf24f0 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:05.973285 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 07:31:05.973560 systemd[1]: Stopped audit-rules.service. Dec 13 07:31:05.978458 systemd[1]: Starting audit-rules.service... Dec 13 07:31:05.967000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 07:31:05.991233 kernel: audit: type=1327 audit(1734075065.967:210): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 07:31:05.991325 kernel: audit: type=1131 audit(1734075065.971:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:05.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.010519 augenrules[1370]: No rules Dec 13 07:31:06.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.011931 systemd[1]: Finished audit-rules.service. Dec 13 07:31:06.018045 sudo[1349]: pam_unix(sudo:session): session closed for user root Dec 13 07:31:06.018809 kernel: audit: type=1130 audit(1734075066.010:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.016000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.016000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.030539 kernel: audit: type=1106 audit(1734075066.016:213): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.030651 kernel: audit: type=1104 audit(1734075066.016:214): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.161474 sshd[1344]: pam_unix(sshd:session): session closed for user core Dec 13 07:31:06.161000 audit[1344]: USER_END pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:06.164846 systemd[1]: sshd@7-10.230.40.198:22-139.178.89.65:56938.service: Deactivated successfully. Dec 13 07:31:06.166015 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 07:31:06.167614 systemd-logind[1185]: Session 8 logged out. Waiting for processes to exit. Dec 13 07:31:06.168852 systemd-logind[1185]: Removed session 8. Dec 13 07:31:06.161000 audit[1344]: CRED_DISP pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:06.175141 kernel: audit: type=1106 audit(1734075066.161:215): pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:06.175235 kernel: audit: type=1104 audit(1734075066.161:216): pid=1344 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:06.175283 kernel: audit: type=1131 audit(1734075066.163:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.40.198:22-139.178.89.65:56938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.40.198:22-139.178.89.65:56938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:06.308329 systemd[1]: Started sshd@8-10.230.40.198:22-139.178.89.65:56950.service. Dec 13 07:31:06.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.40.198:22-139.178.89.65:56950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:07.203000 audit[1376]: USER_ACCT pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:07.205802 sshd[1376]: Accepted publickey for core from 139.178.89.65 port 56950 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:31:07.205000 audit[1376]: CRED_ACQ pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:07.205000 audit[1376]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb06d1ae0 a2=3 a3=0 items=0 ppid=1 pid=1376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:31:07.208112 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:31:07.214836 systemd-logind[1185]: New session 9 of user core. Dec 13 07:31:07.215712 systemd[1]: Started session-9.scope. Dec 13 07:31:07.221000 audit[1376]: USER_START pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:07.223000 audit[1378]: CRED_ACQ pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:07.678000 audit[1379]: USER_ACCT pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:07.680773 sudo[1379]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 07:31:07.679000 audit[1379]: CRED_REFR pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:07.681969 sudo[1379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 07:31:07.683000 audit[1379]: USER_START pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:07.717670 systemd[1]: Starting docker.service... Dec 13 07:31:07.778751 env[1389]: time="2024-12-13T07:31:07.778658663Z" level=info msg="Starting up" Dec 13 07:31:07.781762 env[1389]: time="2024-12-13T07:31:07.781688537Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 07:31:07.781762 env[1389]: time="2024-12-13T07:31:07.781725922Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 07:31:07.781957 env[1389]: time="2024-12-13T07:31:07.781812097Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 07:31:07.781957 env[1389]: time="2024-12-13T07:31:07.781857057Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 07:31:07.785539 env[1389]: time="2024-12-13T07:31:07.785500414Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 07:31:07.785539 env[1389]: time="2024-12-13T07:31:07.785529246Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 07:31:07.785890 env[1389]: time="2024-12-13T07:31:07.785547312Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 07:31:07.785890 env[1389]: time="2024-12-13T07:31:07.785572094Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 07:31:07.793494 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2906677067-merged.mount: Deactivated successfully. Dec 13 07:31:07.822411 env[1389]: time="2024-12-13T07:31:07.822356182Z" level=info msg="Loading containers: start." Dec 13 07:31:07.908000 audit[1421]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.908000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff31143050 a2=0 a3=7fff3114303c items=0 ppid=1389 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 07:31:07.912000 audit[1423]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.912000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd2854d6d0 a2=0 a3=7ffd2854d6bc items=0 ppid=1389 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 07:31:07.915000 audit[1425]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.915000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdacf01960 a2=0 a3=7ffdacf0194c items=0 ppid=1389 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 07:31:07.918000 audit[1427]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.918000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffde38a6900 a2=0 a3=7ffde38a68ec items=0 ppid=1389 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.918000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 07:31:07.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.40.198:22-36.155.130.1:38086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:07.924823 systemd[1]: Started sshd@9-10.230.40.198:22-36.155.130.1:38086.service. Dec 13 07:31:07.929000 audit[1431]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.929000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebe020540 a2=0 a3=7ffebe02052c items=0 ppid=1389 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 07:31:07.952000 audit[1437]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.952000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2da29ec0 a2=0 a3=7ffd2da29eac items=0 ppid=1389 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.952000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 07:31:07.962000 audit[1439]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.962000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc1e2d710 a2=0 a3=7ffcc1e2d6fc items=0 ppid=1389 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 07:31:07.966000 audit[1441]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.966000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc5e38a600 a2=0 a3=7ffc5e38a5ec items=0 ppid=1389 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 07:31:07.969000 audit[1443]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.969000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe40392d70 a2=0 a3=7ffe40392d5c items=0 ppid=1389 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 07:31:07.980000 audit[1447]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.980000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc103e6320 a2=0 a3=7ffc103e630c items=0 ppid=1389 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 07:31:07.986000 audit[1448]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:07.986000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcfa027160 a2=0 a3=7ffcfa02714c items=0 ppid=1389 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:07.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 07:31:08.001815 kernel: Initializing XFRM netlink socket Dec 13 07:31:08.052022 env[1389]: time="2024-12-13T07:31:08.051963904Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 07:31:08.092000 audit[1456]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.092000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeac449de0 a2=0 a3=7ffeac449dcc items=0 ppid=1389 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.092000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 07:31:08.104000 audit[1459]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.104000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdba36b770 a2=0 a3=7ffdba36b75c items=0 ppid=1389 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 07:31:08.109000 audit[1462]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.109000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc5ad98850 a2=0 a3=7ffc5ad9883c items=0 ppid=1389 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 07:31:08.112000 audit[1464]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.112000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffedf4c85a0 a2=0 a3=7ffedf4c858c items=0 ppid=1389 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 07:31:08.115000 audit[1466]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.115000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff79c4c0b0 a2=0 a3=7fff79c4c09c items=0 ppid=1389 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 07:31:08.118000 audit[1468]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.118000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffceb01f5a0 a2=0 a3=7ffceb01f58c items=0 ppid=1389 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 07:31:08.121000 audit[1470]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.121000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe81e7dc60 a2=0 a3=7ffe81e7dc4c items=0 ppid=1389 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 07:31:08.133000 audit[1473]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.133000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc5f54ca90 a2=0 a3=7ffc5f54ca7c items=0 ppid=1389 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 07:31:08.137000 audit[1475]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.137000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff6664f840 a2=0 a3=7fff6664f82c items=0 ppid=1389 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.137000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 07:31:08.140000 audit[1477]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.140000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe2f1241c0 a2=0 a3=7ffe2f1241ac items=0 ppid=1389 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 07:31:08.143000 audit[1479]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.143000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff4199160 a2=0 a3=7ffff419914c items=0 ppid=1389 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.143000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 07:31:08.145952 systemd-networkd[1021]: docker0: Link UP Dec 13 07:31:08.162000 audit[1483]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.162000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc7ff0180 a2=0 a3=7ffdc7ff016c items=0 ppid=1389 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 07:31:08.167000 audit[1484]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:08.167000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec82c02a0 a2=0 a3=7ffec82c028c items=0 ppid=1389 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:08.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 07:31:08.169884 env[1389]: time="2024-12-13T07:31:08.169823722Z" level=info msg="Loading containers: done." Dec 13 07:31:08.187286 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3004994739-merged.mount: Deactivated successfully. Dec 13 07:31:08.197039 env[1389]: time="2024-12-13T07:31:08.196975815Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 07:31:08.197565 env[1389]: time="2024-12-13T07:31:08.197535189Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 07:31:08.197904 env[1389]: time="2024-12-13T07:31:08.197878032Z" level=info msg="Daemon has completed initialization" Dec 13 07:31:08.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:08.216901 systemd[1]: Started docker.service. Dec 13 07:31:08.228235 env[1389]: time="2024-12-13T07:31:08.228120277Z" level=info msg="API listen on /run/docker.sock" Dec 13 07:31:08.364953 sshd[1430]: kex_exchange_identification: banner line contains invalid characters Dec 13 07:31:08.364953 sshd[1430]: banner exchange: Connection from 36.155.130.1 port 38086: invalid format Dec 13 07:31:08.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.40.198:22-36.155.130.1:38086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:08.366477 systemd[1]: sshd@9-10.230.40.198:22-36.155.130.1:38086.service: Deactivated successfully. Dec 13 07:31:09.728792 env[1198]: time="2024-12-13T07:31:09.728602655Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 07:31:10.617379 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4159805021.mount: Deactivated successfully. Dec 13 07:31:13.142416 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 07:31:13.151447 kernel: kauditd_printk_skb: 86 callbacks suppressed Dec 13 07:31:13.151585 kernel: audit: type=1131 audit(1734075073.141:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:13.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:13.166000 audit: BPF prog-id=43 op=UNLOAD Dec 13 07:31:13.169945 kernel: audit: type=1334 audit(1734075073.166:255): prog-id=43 op=UNLOAD Dec 13 07:31:13.166000 audit: BPF prog-id=42 op=UNLOAD Dec 13 07:31:13.173658 kernel: audit: type=1334 audit(1734075073.166:256): prog-id=42 op=UNLOAD Dec 13 07:31:13.174248 kernel: audit: type=1334 audit(1734075073.166:257): prog-id=41 op=UNLOAD Dec 13 07:31:13.166000 audit: BPF prog-id=41 op=UNLOAD Dec 13 07:31:13.232159 env[1198]: time="2024-12-13T07:31:13.232077687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:13.234067 env[1198]: time="2024-12-13T07:31:13.234034904Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:13.237170 env[1198]: time="2024-12-13T07:31:13.237117230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:13.239471 env[1198]: time="2024-12-13T07:31:13.239426136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:13.242124 env[1198]: time="2024-12-13T07:31:13.242082975Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 07:31:13.256378 env[1198]: time="2024-12-13T07:31:13.256329783Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 07:31:14.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:14.738291 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 07:31:14.738616 systemd[1]: Stopped kubelet.service. Dec 13 07:31:14.743741 systemd[1]: Starting kubelet.service... Dec 13 07:31:14.746892 kernel: audit: type=1130 audit(1734075074.736:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:14.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:14.753814 kernel: audit: type=1131 audit(1734075074.736:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:14.890266 systemd[1]: Started kubelet.service. Dec 13 07:31:14.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:14.896795 kernel: audit: type=1130 audit(1734075074.889:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:14.963704 kubelet[1537]: E1213 07:31:14.963640 1537 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 07:31:14.965453 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 07:31:14.965692 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 07:31:14.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 07:31:14.971796 kernel: audit: type=1131 audit(1734075074.964:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 07:31:16.298706 env[1198]: time="2024-12-13T07:31:16.298588094Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:16.305122 env[1198]: time="2024-12-13T07:31:16.305057159Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:16.307332 env[1198]: time="2024-12-13T07:31:16.307286625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:16.310267 env[1198]: time="2024-12-13T07:31:16.310235429Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:16.313051 env[1198]: time="2024-12-13T07:31:16.311926277Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 07:31:16.326892 env[1198]: time="2024-12-13T07:31:16.326842988Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 07:31:18.260634 env[1198]: time="2024-12-13T07:31:18.260519297Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:18.263481 env[1198]: time="2024-12-13T07:31:18.263439158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:18.268083 env[1198]: time="2024-12-13T07:31:18.266807256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:18.269805 env[1198]: time="2024-12-13T07:31:18.269151480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:18.270370 env[1198]: time="2024-12-13T07:31:18.270327709Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 07:31:18.284636 env[1198]: time="2024-12-13T07:31:18.284585060Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 07:31:19.867495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1392020292.mount: Deactivated successfully. Dec 13 07:31:20.775116 env[1198]: time="2024-12-13T07:31:20.775023352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:20.777680 env[1198]: time="2024-12-13T07:31:20.777641403Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:20.779329 env[1198]: time="2024-12-13T07:31:20.779293354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:20.780937 env[1198]: time="2024-12-13T07:31:20.780889804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:20.781657 env[1198]: time="2024-12-13T07:31:20.781615214Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 07:31:20.799029 env[1198]: time="2024-12-13T07:31:20.798978438Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 07:31:21.343177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount934736720.mount: Deactivated successfully. Dec 13 07:31:22.441941 kernel: audit: type=1130 audit(1734075082.432:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.40.198:22-36.155.130.1:46872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:22.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.40.198:22-36.155.130.1:46872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:22.432635 systemd[1]: Started sshd@10-10.230.40.198:22-36.155.130.1:46872.service. Dec 13 07:31:22.798062 env[1198]: time="2024-12-13T07:31:22.796818317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:22.798796 env[1198]: time="2024-12-13T07:31:22.798749983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:22.816903 env[1198]: time="2024-12-13T07:31:22.816829956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:22.819861 env[1198]: time="2024-12-13T07:31:22.819817844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:22.821545 env[1198]: time="2024-12-13T07:31:22.821467452Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 07:31:22.834511 env[1198]: time="2024-12-13T07:31:22.834449523Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 07:31:23.464522 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount9772245.mount: Deactivated successfully. Dec 13 07:31:23.467848 env[1198]: time="2024-12-13T07:31:23.467785538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:23.470994 env[1198]: time="2024-12-13T07:31:23.470948301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:23.473853 env[1198]: time="2024-12-13T07:31:23.473809156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:23.476717 env[1198]: time="2024-12-13T07:31:23.476578465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:23.477702 env[1198]: time="2024-12-13T07:31:23.477620829Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 07:31:23.491960 env[1198]: time="2024-12-13T07:31:23.491896326Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 07:31:24.061794 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3473556939.mount: Deactivated successfully. Dec 13 07:31:24.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.40.198:22-27.25.130.222:55424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:24.306904 systemd[1]: Started sshd@11-10.230.40.198:22-27.25.130.222:55424.service. Dec 13 07:31:24.316862 kernel: audit: type=1130 audit(1734075084.306:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.40.198:22-27.25.130.222:55424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:24.988457 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 07:31:24.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:24.988813 systemd[1]: Stopped kubelet.service. Dec 13 07:31:24.995838 kernel: audit: type=1130 audit(1734075084.988:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:24.993883 systemd[1]: Starting kubelet.service... Dec 13 07:31:24.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:25.001801 kernel: audit: type=1131 audit(1734075084.988:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:25.230967 systemd[1]: Started kubelet.service. Dec 13 07:31:25.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:25.236823 kernel: audit: type=1130 audit(1734075085.230:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:25.304386 kubelet[1577]: E1213 07:31:25.303312 1577 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 07:31:25.306652 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 07:31:25.306912 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 07:31:25.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 07:31:25.312810 kernel: audit: type=1131 audit(1734075085.305:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 07:31:27.315414 update_engine[1189]: I1213 07:31:27.315147 1189 update_attempter.cc:509] Updating boot flags... Dec 13 07:31:28.023055 env[1198]: time="2024-12-13T07:31:28.022969456Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:28.027435 env[1198]: time="2024-12-13T07:31:28.027371664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:28.030944 env[1198]: time="2024-12-13T07:31:28.030890882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:28.033749 env[1198]: time="2024-12-13T07:31:28.033710132Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:28.035028 env[1198]: time="2024-12-13T07:31:28.034988406Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 07:31:31.948589 systemd[1]: Stopped kubelet.service. Dec 13 07:31:31.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:31.958618 kernel: audit: type=1130 audit(1734075091.949:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:31.958798 kernel: audit: type=1131 audit(1734075091.949:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:31.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:31.959309 systemd[1]: Starting kubelet.service... Dec 13 07:31:31.999683 systemd[1]: Reloading. Dec 13 07:31:32.135195 /usr/lib/systemd/system-generators/torcx-generator[1688]: time="2024-12-13T07:31:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 07:31:32.135248 /usr/lib/systemd/system-generators/torcx-generator[1688]: time="2024-12-13T07:31:32Z" level=info msg="torcx already run" Dec 13 07:31:32.265539 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 07:31:32.265580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 07:31:32.293423 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 07:31:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.402237 kernel: audit: type=1400 audit(1734075092.389:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.402347 kernel: audit: type=1400 audit(1734075092.391:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407803 kernel: audit: type=1400 audit(1734075092.391:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.412826 kernel: audit: type=1400 audit(1734075092.391:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.418843 kernel: audit: type=1400 audit(1734075092.391:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.425073 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 07:31:32.425149 kernel: audit: type=1400 audit(1734075092.391:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.425203 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit: BPF prog-id=46 op=LOAD Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.396000 audit: BPF prog-id=47 op=LOAD Dec 13 07:31:32.396000 audit: BPF prog-id=27 op=UNLOAD Dec 13 07:31:32.396000 audit: BPF prog-id=28 op=UNLOAD Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.401000 audit: BPF prog-id=48 op=LOAD Dec 13 07:31:32.401000 audit: BPF prog-id=29 op=UNLOAD Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.406000 audit: BPF prog-id=49 op=LOAD Dec 13 07:31:32.406000 audit: BPF prog-id=30 op=UNLOAD Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit: BPF prog-id=50 op=LOAD Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.411000 audit: BPF prog-id=51 op=LOAD Dec 13 07:31:32.412000 audit: BPF prog-id=31 op=UNLOAD Dec 13 07:31:32.412000 audit: BPF prog-id=32 op=UNLOAD Dec 13 07:31:32.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.426000 audit: BPF prog-id=52 op=LOAD Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit: BPF prog-id=56 op=LOAD Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.430000 audit: BPF prog-id=57 op=LOAD Dec 13 07:31:32.430000 audit: BPF prog-id=34 op=UNLOAD Dec 13 07:31:32.430000 audit: BPF prog-id=35 op=UNLOAD Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit: BPF prog-id=58 op=LOAD Dec 13 07:31:32.433000 audit: BPF prog-id=37 op=UNLOAD Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.434000 audit: BPF prog-id=59 op=LOAD Dec 13 07:31:32.434000 audit: BPF prog-id=44 op=UNLOAD Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:32.436000 audit: BPF prog-id=60 op=LOAD Dec 13 07:31:32.436000 audit: BPF prog-id=36 op=UNLOAD Dec 13 07:31:32.460016 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 07:31:32.460189 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 07:31:32.460595 systemd[1]: Stopped kubelet.service. Dec 13 07:31:32.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 07:31:32.464926 systemd[1]: Starting kubelet.service... Dec 13 07:31:32.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:32.713380 systemd[1]: Started kubelet.service. Dec 13 07:31:32.834213 kubelet[1739]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 07:31:32.834213 kubelet[1739]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 07:31:32.834213 kubelet[1739]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 07:31:32.834968 kubelet[1739]: I1213 07:31:32.834315 1739 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 07:31:33.118017 kubelet[1739]: I1213 07:31:33.117936 1739 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 07:31:33.118017 kubelet[1739]: I1213 07:31:33.118007 1739 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 07:31:33.118381 kubelet[1739]: I1213 07:31:33.118356 1739 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 07:31:33.146889 kubelet[1739]: E1213 07:31:33.146838 1739 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.230.40.198:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.147202 kubelet[1739]: I1213 07:31:33.147152 1739 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 07:31:33.165337 kubelet[1739]: I1213 07:31:33.165283 1739 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 07:31:33.169235 kubelet[1739]: I1213 07:31:33.169178 1739 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 07:31:33.169627 kubelet[1739]: I1213 07:31:33.169351 1739 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-9sek4.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 07:31:33.170023 kubelet[1739]: I1213 07:31:33.169997 1739 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 07:31:33.170146 kubelet[1739]: I1213 07:31:33.170125 1739 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 07:31:33.170480 kubelet[1739]: I1213 07:31:33.170458 1739 state_mem.go:36] "Initialized new in-memory state store" Dec 13 07:31:33.172026 kubelet[1739]: I1213 07:31:33.171999 1739 kubelet.go:400] "Attempting to sync node with API server" Dec 13 07:31:33.172183 kubelet[1739]: I1213 07:31:33.172159 1739 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 07:31:33.172962 kubelet[1739]: I1213 07:31:33.172939 1739 kubelet.go:312] "Adding apiserver pod source" Dec 13 07:31:33.173141 kubelet[1739]: I1213 07:31:33.173117 1739 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 07:31:33.174447 kubelet[1739]: W1213 07:31:33.174377 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.40.198:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-9sek4.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.174605 kubelet[1739]: E1213 07:31:33.174579 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.40.198:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-9sek4.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.179686 kubelet[1739]: I1213 07:31:33.179510 1739 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 07:31:33.183481 kubelet[1739]: I1213 07:31:33.183437 1739 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 07:31:33.183598 kubelet[1739]: W1213 07:31:33.183575 1739 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 07:31:33.184693 kubelet[1739]: I1213 07:31:33.184654 1739 server.go:1264] "Started kubelet" Dec 13 07:31:33.186808 kubelet[1739]: W1213 07:31:33.184863 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.40.198:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.186808 kubelet[1739]: E1213 07:31:33.184925 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.230.40.198:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.200000 audit[1739]: AVC avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:33.200000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 07:31:33.200000 audit[1739]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c8c3c0 a1=c000785788 a2=c000c8c390 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.200000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 07:31:33.200000 audit[1739]: AVC avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:33.200000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 07:31:33.200000 audit[1739]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a990a0 a1=c0007857a0 a2=c000c8c450 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.200000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 07:31:33.202605 kubelet[1739]: I1213 07:31:33.201491 1739 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 07:31:33.202605 kubelet[1739]: I1213 07:31:33.201556 1739 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 07:31:33.202605 kubelet[1739]: I1213 07:31:33.201681 1739 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 07:31:33.204047 kubelet[1739]: E1213 07:31:33.203827 1739 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.40.198:6443/api/v1/namespaces/default/events\": dial tcp 10.230.40.198:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-9sek4.gb1.brightbox.com.1810ac1c171ee1f3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-9sek4.gb1.brightbox.com,UID:srv-9sek4.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-9sek4.gb1.brightbox.com,},FirstTimestamp:2024-12-13 07:31:33.184602611 +0000 UTC m=+0.463011461,LastTimestamp:2024-12-13 07:31:33.184602611 +0000 UTC m=+0.463011461,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-9sek4.gb1.brightbox.com,}" Dec 13 07:31:33.206314 kubelet[1739]: E1213 07:31:33.206284 1739 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 07:31:33.206000 audit[1749]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.206000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdbcdd6800 a2=0 a3=7ffdbcdd67ec items=0 ppid=1739 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 07:31:33.208000 audit[1750]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.208000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8015dc10 a2=0 a3=7ffc8015dbfc items=0 ppid=1739 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 07:31:33.210112 kubelet[1739]: I1213 07:31:33.210077 1739 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 07:31:33.211933 kubelet[1739]: I1213 07:31:33.211875 1739 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 07:31:33.214289 kubelet[1739]: I1213 07:31:33.214219 1739 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 07:31:33.215085 kubelet[1739]: I1213 07:31:33.215058 1739 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 07:31:33.215870 kubelet[1739]: I1213 07:31:33.215839 1739 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 07:31:33.216019 kubelet[1739]: I1213 07:31:33.215963 1739 reconciler.go:26] "Reconciler: start to sync state" Dec 13 07:31:33.217709 kubelet[1739]: I1213 07:31:33.217683 1739 server.go:455] "Adding debug handlers to kubelet server" Dec 13 07:31:33.216000 audit[1752]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.216000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2678a130 a2=0 a3=7fff2678a11c items=0 ppid=1739 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 07:31:33.221493 kubelet[1739]: W1213 07:31:33.221436 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.40.198:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.221658 kubelet[1739]: E1213 07:31:33.221626 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.230.40.198:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.221897 kubelet[1739]: E1213 07:31:33.221853 1739 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.40.198:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-9sek4.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.40.198:6443: connect: connection refused" interval="200ms" Dec 13 07:31:33.222300 kubelet[1739]: I1213 07:31:33.222267 1739 factory.go:221] Registration of the systemd container factory successfully Dec 13 07:31:33.221000 audit[1754]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.221000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe7a94adf0 a2=0 a3=7ffe7a94addc items=0 ppid=1739 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 07:31:33.223831 kubelet[1739]: I1213 07:31:33.223802 1739 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 07:31:33.226483 kubelet[1739]: I1213 07:31:33.226458 1739 factory.go:221] Registration of the containerd container factory successfully Dec 13 07:31:33.246000 audit[1761]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.246000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff83775ec0 a2=0 a3=7fff83775eac items=0 ppid=1739 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 07:31:33.248868 kubelet[1739]: I1213 07:31:33.248816 1739 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 07:31:33.249000 audit[1763]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:33.249000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca1aa3d20 a2=0 a3=7ffca1aa3d0c items=0 ppid=1739 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 07:31:33.251000 audit[1764]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.251000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff76e36c80 a2=0 a3=7fff76e36c6c items=0 ppid=1739 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 07:31:33.253645 kubelet[1739]: I1213 07:31:33.253572 1739 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 07:31:33.253879 kubelet[1739]: I1213 07:31:33.253855 1739 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 07:31:33.254054 kubelet[1739]: I1213 07:31:33.254020 1739 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 07:31:33.255567 kubelet[1739]: E1213 07:31:33.255505 1739 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 07:31:33.259149 kubelet[1739]: W1213 07:31:33.259119 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.40.198:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.258000 audit[1768]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:33.258000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff2743fc0 a2=0 a3=7ffff2743fac items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 07:31:33.259659 kubelet[1739]: I1213 07:31:33.259605 1739 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 07:31:33.259659 kubelet[1739]: I1213 07:31:33.259633 1739 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 07:31:33.259911 kubelet[1739]: I1213 07:31:33.259671 1739 state_mem.go:36] "Initialized new in-memory state store" Dec 13 07:31:33.260498 kubelet[1739]: E1213 07:31:33.260474 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.40.198:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:33.261496 kubelet[1739]: I1213 07:31:33.261463 1739 policy_none.go:49] "None policy: Start" Dec 13 07:31:33.262545 kubelet[1739]: I1213 07:31:33.262506 1739 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 07:31:33.262613 kubelet[1739]: I1213 07:31:33.262564 1739 state_mem.go:35] "Initializing new in-memory state store" Dec 13 07:31:33.262000 audit[1767]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.262000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa332f790 a2=0 a3=7fffa332f77c items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.262000 audit[1770]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:33.262000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb1c02260 a2=0 a3=7ffcb1c0224c items=0 ppid=1739 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 07:31:33.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 07:31:33.264000 audit[1771]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:33.264000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc3656a480 a2=0 a3=7ffc3656a46c items=0 ppid=1739 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 07:31:33.267000 audit[1772]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:33.267000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4233c4f0 a2=0 a3=7ffe4233c4dc items=0 ppid=1739 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 07:31:33.276839 systemd[1]: Created slice kubepods.slice. Dec 13 07:31:33.283890 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 07:31:33.287669 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 07:31:33.294000 audit[1739]: AVC avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:33.294000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 07:31:33.294000 audit[1739]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000be1470 a1=c000ada8a0 a2=c000be1440 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:33.294000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 07:31:33.295783 kubelet[1739]: I1213 07:31:33.295206 1739 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 07:31:33.295783 kubelet[1739]: I1213 07:31:33.295316 1739 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 07:31:33.295783 kubelet[1739]: I1213 07:31:33.295535 1739 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 07:31:33.295783 kubelet[1739]: I1213 07:31:33.295740 1739 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 07:31:33.299000 kubelet[1739]: E1213 07:31:33.298958 1739 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:33.314483 kubelet[1739]: I1213 07:31:33.314434 1739 kubelet_node_status.go:73] "Attempting to register node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.315254 kubelet[1739]: E1213 07:31:33.315214 1739 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.40.198:6443/api/v1/nodes\": dial tcp 10.230.40.198:6443: connect: connection refused" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.356843 kubelet[1739]: I1213 07:31:33.356705 1739 topology_manager.go:215] "Topology Admit Handler" podUID="122ad72fbd46fb77753ddefc8a1a39d5" podNamespace="kube-system" podName="kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.360031 kubelet[1739]: I1213 07:31:33.359734 1739 topology_manager.go:215] "Topology Admit Handler" podUID="e673e95216bd6b0d2a2f4494c2016667" podNamespace="kube-system" podName="kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.362950 kubelet[1739]: I1213 07:31:33.362919 1739 topology_manager.go:215] "Topology Admit Handler" podUID="e15e711fc954271e08ada4f29e6dcd03" podNamespace="kube-system" podName="kube-scheduler-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.370448 systemd[1]: Created slice kubepods-burstable-pod122ad72fbd46fb77753ddefc8a1a39d5.slice. Dec 13 07:31:33.386726 systemd[1]: Created slice kubepods-burstable-pode673e95216bd6b0d2a2f4494c2016667.slice. Dec 13 07:31:33.396401 systemd[1]: Created slice kubepods-burstable-pode15e711fc954271e08ada4f29e6dcd03.slice. Dec 13 07:31:33.423382 kubelet[1739]: E1213 07:31:33.423324 1739 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.40.198:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-9sek4.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.40.198:6443: connect: connection refused" interval="400ms" Dec 13 07:31:33.517385 kubelet[1739]: I1213 07:31:33.517314 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-k8s-certs\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517576 kubelet[1739]: I1213 07:31:33.517394 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517576 kubelet[1739]: I1213 07:31:33.517458 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/122ad72fbd46fb77753ddefc8a1a39d5-ca-certs\") pod \"kube-apiserver-srv-9sek4.gb1.brightbox.com\" (UID: \"122ad72fbd46fb77753ddefc8a1a39d5\") " pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517576 kubelet[1739]: I1213 07:31:33.517487 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/122ad72fbd46fb77753ddefc8a1a39d5-k8s-certs\") pod \"kube-apiserver-srv-9sek4.gb1.brightbox.com\" (UID: \"122ad72fbd46fb77753ddefc8a1a39d5\") " pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517576 kubelet[1739]: I1213 07:31:33.517530 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/122ad72fbd46fb77753ddefc8a1a39d5-usr-share-ca-certificates\") pod \"kube-apiserver-srv-9sek4.gb1.brightbox.com\" (UID: \"122ad72fbd46fb77753ddefc8a1a39d5\") " pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517576 kubelet[1739]: I1213 07:31:33.517557 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-ca-certs\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517888 kubelet[1739]: I1213 07:31:33.517609 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-flexvolume-dir\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517888 kubelet[1739]: I1213 07:31:33.517646 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-kubeconfig\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.517888 kubelet[1739]: I1213 07:31:33.517784 1739 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e15e711fc954271e08ada4f29e6dcd03-kubeconfig\") pod \"kube-scheduler-srv-9sek4.gb1.brightbox.com\" (UID: \"e15e711fc954271e08ada4f29e6dcd03\") " pod="kube-system/kube-scheduler-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.518990 kubelet[1739]: I1213 07:31:33.518955 1739 kubelet_node_status.go:73] "Attempting to register node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.519552 kubelet[1739]: E1213 07:31:33.519521 1739 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.40.198:6443/api/v1/nodes\": dial tcp 10.230.40.198:6443: connect: connection refused" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.686811 env[1198]: time="2024-12-13T07:31:33.686017237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-9sek4.gb1.brightbox.com,Uid:122ad72fbd46fb77753ddefc8a1a39d5,Namespace:kube-system,Attempt:0,}" Dec 13 07:31:33.696464 env[1198]: time="2024-12-13T07:31:33.696264178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-9sek4.gb1.brightbox.com,Uid:e673e95216bd6b0d2a2f4494c2016667,Namespace:kube-system,Attempt:0,}" Dec 13 07:31:33.700151 env[1198]: time="2024-12-13T07:31:33.700117021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-9sek4.gb1.brightbox.com,Uid:e15e711fc954271e08ada4f29e6dcd03,Namespace:kube-system,Attempt:0,}" Dec 13 07:31:33.824519 kubelet[1739]: E1213 07:31:33.824424 1739 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.40.198:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-9sek4.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.40.198:6443: connect: connection refused" interval="800ms" Dec 13 07:31:33.922905 kubelet[1739]: I1213 07:31:33.922455 1739 kubelet_node_status.go:73] "Attempting to register node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:33.922905 kubelet[1739]: E1213 07:31:33.922841 1739 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.40.198:6443/api/v1/nodes\": dial tcp 10.230.40.198:6443: connect: connection refused" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:34.093100 kubelet[1739]: W1213 07:31:34.092980 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.40.198:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-9sek4.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.093100 kubelet[1739]: E1213 07:31:34.093062 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.40.198:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-9sek4.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.189080 kubelet[1739]: W1213 07:31:34.188982 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.40.198:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.189080 kubelet[1739]: E1213 07:31:34.189041 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.230.40.198:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.190314 kubelet[1739]: W1213 07:31:34.190257 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.40.198:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.190419 kubelet[1739]: E1213 07:31:34.190321 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.230.40.198:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.228133 kubelet[1739]: W1213 07:31:34.228033 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.40.198:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.228133 kubelet[1739]: E1213 07:31:34.228090 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.230.40.198:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:34.298659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3988456846.mount: Deactivated successfully. Dec 13 07:31:34.325439 env[1198]: time="2024-12-13T07:31:34.325366591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.327902 env[1198]: time="2024-12-13T07:31:34.327867408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.329054 env[1198]: time="2024-12-13T07:31:34.329021958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.331021 env[1198]: time="2024-12-13T07:31:34.330988686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.333043 env[1198]: time="2024-12-13T07:31:34.333004576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.334399 env[1198]: time="2024-12-13T07:31:34.334365740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.337716 env[1198]: time="2024-12-13T07:31:34.337669729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.345650 env[1198]: time="2024-12-13T07:31:34.345547133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.346712 env[1198]: time="2024-12-13T07:31:34.346679194Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.347690 env[1198]: time="2024-12-13T07:31:34.347657708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.348643 env[1198]: time="2024-12-13T07:31:34.348609367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.351505 env[1198]: time="2024-12-13T07:31:34.351469909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:34.384977 env[1198]: time="2024-12-13T07:31:34.384745171Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:31:34.384977 env[1198]: time="2024-12-13T07:31:34.384857794Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:31:34.387135 env[1198]: time="2024-12-13T07:31:34.384876523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:31:34.387135 env[1198]: time="2024-12-13T07:31:34.385479224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9111aef4657acdcd30209169fc7027ca9c1bea91caf4747c735eeaf00310b5b0 pid=1779 runtime=io.containerd.runc.v2 Dec 13 07:31:34.399737 env[1198]: time="2024-12-13T07:31:34.399660590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:31:34.399967 env[1198]: time="2024-12-13T07:31:34.399749275Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:31:34.399967 env[1198]: time="2024-12-13T07:31:34.399815450Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:31:34.400182 env[1198]: time="2024-12-13T07:31:34.400117997Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95244f98da92b077d3e4f8f78829841b67e973ffd9e29cff54292338b4223e4f pid=1808 runtime=io.containerd.runc.v2 Dec 13 07:31:34.403803 env[1198]: time="2024-12-13T07:31:34.403711239Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:31:34.403910 env[1198]: time="2024-12-13T07:31:34.403826363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:31:34.403910 env[1198]: time="2024-12-13T07:31:34.403900276Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:31:34.404396 env[1198]: time="2024-12-13T07:31:34.404336853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9aa68d7e1af6007c19a5ec587517d16363e481122df8ff8e3996c4ab4aab008d pid=1801 runtime=io.containerd.runc.v2 Dec 13 07:31:34.416282 systemd[1]: Started cri-containerd-9111aef4657acdcd30209169fc7027ca9c1bea91caf4747c735eeaf00310b5b0.scope. Dec 13 07:31:34.440478 systemd[1]: Started cri-containerd-95244f98da92b077d3e4f8f78829841b67e973ffd9e29cff54292338b4223e4f.scope. Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.448000 audit: BPF prog-id=61 op=LOAD Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1779 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313161656634363537616364636433303230393136396663373032 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1779 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313161656634363537616364636433303230393136396663373032 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit: BPF prog-id=62 op=LOAD Dec 13 07:31:34.449000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001fdd70 items=0 ppid=1779 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313161656634363537616364636433303230393136396663373032 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit: BPF prog-id=63 op=LOAD Dec 13 07:31:34.449000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001fddb8 items=0 ppid=1779 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313161656634363537616364636433303230393136396663373032 Dec 13 07:31:34.449000 audit: BPF prog-id=63 op=UNLOAD Dec 13 07:31:34.449000 audit: BPF prog-id=62 op=UNLOAD Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { perfmon } for pid=1796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit[1796]: AVC avc: denied { bpf } for pid=1796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.449000 audit: BPF prog-id=64 op=LOAD Dec 13 07:31:34.449000 audit[1796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f81c8 items=0 ppid=1779 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313161656634363537616364636433303230393136396663373032 Dec 13 07:31:34.467179 systemd[1]: Started cri-containerd-9aa68d7e1af6007c19a5ec587517d16363e481122df8ff8e3996c4ab4aab008d.scope. Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.485000 audit: BPF prog-id=65 op=LOAD Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1808 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323434663938646139326230373764336534663866373838323938 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1808 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323434663938646139326230373764336534663866373838323938 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit: BPF prog-id=66 op=LOAD Dec 13 07:31:34.487000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003528c0 items=0 ppid=1808 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323434663938646139326230373764336534663866373838323938 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit: BPF prog-id=67 op=LOAD Dec 13 07:31:34.487000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000352908 items=0 ppid=1808 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323434663938646139326230373764336534663866373838323938 Dec 13 07:31:34.487000 audit: BPF prog-id=67 op=UNLOAD Dec 13 07:31:34.487000 audit: BPF prog-id=66 op=UNLOAD Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { perfmon } for pid=1826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit[1826]: AVC avc: denied { bpf } for pid=1826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.487000 audit: BPF prog-id=68 op=LOAD Dec 13 07:31:34.487000 audit[1826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000352d18 items=0 ppid=1808 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935323434663938646139326230373764336534663866373838323938 Dec 13 07:31:34.525378 env[1198]: time="2024-12-13T07:31:34.525306885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-9sek4.gb1.brightbox.com,Uid:122ad72fbd46fb77753ddefc8a1a39d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"9111aef4657acdcd30209169fc7027ca9c1bea91caf4747c735eeaf00310b5b0\"" Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535465 env[1198]: time="2024-12-13T07:31:34.535347000Z" level=info msg="CreateContainer within sandbox \"9111aef4657acdcd30209169fc7027ca9c1bea91caf4747c735eeaf00310b5b0\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 07:31:34.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.534000 audit: BPF prog-id=69 op=LOAD Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1801 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613638643765316166363030376331396135656335383735313764 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1801 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613638643765316166363030376331396135656335383735313764 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit: BPF prog-id=70 op=LOAD Dec 13 07:31:34.535000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00029a350 items=0 ppid=1801 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613638643765316166363030376331396135656335383735313764 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit: BPF prog-id=71 op=LOAD Dec 13 07:31:34.535000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00029a398 items=0 ppid=1801 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613638643765316166363030376331396135656335383735313764 Dec 13 07:31:34.535000 audit: BPF prog-id=71 op=UNLOAD Dec 13 07:31:34.535000 audit: BPF prog-id=70 op=UNLOAD Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { perfmon } for pid=1832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit[1832]: AVC avc: denied { bpf } for pid=1832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.535000 audit: BPF prog-id=72 op=LOAD Dec 13 07:31:34.535000 audit[1832]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00029a7a8 items=0 ppid=1801 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613638643765316166363030376331396135656335383735313764 Dec 13 07:31:34.563669 env[1198]: time="2024-12-13T07:31:34.563615663Z" level=info msg="CreateContainer within sandbox \"9111aef4657acdcd30209169fc7027ca9c1bea91caf4747c735eeaf00310b5b0\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"eedfec96e29fe43e6393f3ca526b2d0b6623f266b43f06928e408bc66a3d7642\"" Dec 13 07:31:34.564637 env[1198]: time="2024-12-13T07:31:34.564603593Z" level=info msg="StartContainer for \"eedfec96e29fe43e6393f3ca526b2d0b6623f266b43f06928e408bc66a3d7642\"" Dec 13 07:31:34.577112 env[1198]: time="2024-12-13T07:31:34.577065128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-9sek4.gb1.brightbox.com,Uid:e673e95216bd6b0d2a2f4494c2016667,Namespace:kube-system,Attempt:0,} returns sandbox id \"95244f98da92b077d3e4f8f78829841b67e973ffd9e29cff54292338b4223e4f\"" Dec 13 07:31:34.582606 env[1198]: time="2024-12-13T07:31:34.582561540Z" level=info msg="CreateContainer within sandbox \"95244f98da92b077d3e4f8f78829841b67e973ffd9e29cff54292338b4223e4f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 07:31:34.605989 env[1198]: time="2024-12-13T07:31:34.598988913Z" level=info msg="CreateContainer within sandbox \"95244f98da92b077d3e4f8f78829841b67e973ffd9e29cff54292338b4223e4f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ff239643352004f74aae24b8fdb072833d5d083f1360794919a180abd6f7cc6d\"" Dec 13 07:31:34.606716 env[1198]: time="2024-12-13T07:31:34.606659367Z" level=info msg="StartContainer for \"ff239643352004f74aae24b8fdb072833d5d083f1360794919a180abd6f7cc6d\"" Dec 13 07:31:34.611101 env[1198]: time="2024-12-13T07:31:34.611065160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-9sek4.gb1.brightbox.com,Uid:e15e711fc954271e08ada4f29e6dcd03,Namespace:kube-system,Attempt:0,} returns sandbox id \"9aa68d7e1af6007c19a5ec587517d16363e481122df8ff8e3996c4ab4aab008d\"" Dec 13 07:31:34.613229 systemd[1]: Started cri-containerd-eedfec96e29fe43e6393f3ca526b2d0b6623f266b43f06928e408bc66a3d7642.scope. Dec 13 07:31:34.621610 env[1198]: time="2024-12-13T07:31:34.621551287Z" level=info msg="CreateContainer within sandbox \"9aa68d7e1af6007c19a5ec587517d16363e481122df8ff8e3996c4ab4aab008d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 07:31:34.625849 kubelet[1739]: E1213 07:31:34.625761 1739 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.40.198:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-9sek4.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.40.198:6443: connect: connection refused" interval="1.6s" Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.644000 audit: BPF prog-id=73 op=LOAD Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1779 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646665633936653239666534336536333933663363613532366232 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1779 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646665633936653239666534336536333933663363613532366232 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit: BPF prog-id=74 op=LOAD Dec 13 07:31:34.645000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001f3720 items=0 ppid=1779 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646665633936653239666534336536333933663363613532366232 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit: BPF prog-id=75 op=LOAD Dec 13 07:31:34.645000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001f3768 items=0 ppid=1779 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646665633936653239666534336536333933663363613532366232 Dec 13 07:31:34.645000 audit: BPF prog-id=75 op=UNLOAD Dec 13 07:31:34.645000 audit: BPF prog-id=74 op=UNLOAD Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.645000 audit: BPF prog-id=76 op=LOAD Dec 13 07:31:34.645000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001f3b78 items=0 ppid=1779 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646665633936653239666534336536333933663363613532366232 Dec 13 07:31:34.649767 env[1198]: time="2024-12-13T07:31:34.647132856Z" level=info msg="CreateContainer within sandbox \"9aa68d7e1af6007c19a5ec587517d16363e481122df8ff8e3996c4ab4aab008d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"809fbed35ce6f30181288e8ec1f57bfd33c416906af91be1d9a7937265c31af6\"" Dec 13 07:31:34.651106 env[1198]: time="2024-12-13T07:31:34.650173106Z" level=info msg="StartContainer for \"809fbed35ce6f30181288e8ec1f57bfd33c416906af91be1d9a7937265c31af6\"" Dec 13 07:31:34.668841 systemd[1]: Started cri-containerd-ff239643352004f74aae24b8fdb072833d5d083f1360794919a180abd6f7cc6d.scope. Dec 13 07:31:34.687220 systemd[1]: Started cri-containerd-809fbed35ce6f30181288e8ec1f57bfd33c416906af91be1d9a7937265c31af6.scope. Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.715000 audit: BPF prog-id=77 op=LOAD Dec 13 07:31:34.716000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.716000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1801 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830396662656433356365366633303138313238386538656331663537 Dec 13 07:31:34.717000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.717000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1801 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830396662656433356365366633303138313238386538656331663537 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.721000 audit: BPF prog-id=78 op=LOAD Dec 13 07:31:34.721000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cf0 items=0 ppid=1801 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830396662656433356365366633303138313238386538656331663537 Dec 13 07:31:34.726035 kubelet[1739]: I1213 07:31:34.726002 1739 kubelet_node_status.go:73] "Attempting to register node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:34.726686 kubelet[1739]: E1213 07:31:34.726653 1739 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.230.40.198:6443/api/v1/nodes\": dial tcp 10.230.40.198:6443: connect: connection refused" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit: BPF prog-id=79 op=LOAD Dec 13 07:31:34.728000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.728000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1808 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323339363433333532303034663734616165323462386664623037 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1808 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323339363433333532303034663734616165323462386664623037 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.729000 audit: BPF prog-id=80 op=LOAD Dec 13 07:31:34.729000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003cad40 items=0 ppid=1808 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323339363433333532303034663734616165323462386664623037 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.730000 audit: BPF prog-id=81 op=LOAD Dec 13 07:31:34.730000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003cad88 items=0 ppid=1808 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323339363433333532303034663734616165323462386664623037 Dec 13 07:31:34.733000 audit: BPF prog-id=81 op=UNLOAD Dec 13 07:31:34.733000 audit: BPF prog-id=80 op=UNLOAD Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.733000 audit: BPF prog-id=82 op=LOAD Dec 13 07:31:34.733000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cb198 items=0 ppid=1808 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323339363433333532303034663734616165323462386664623037 Dec 13 07:31:34.726000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.726000 audit: BPF prog-id=83 op=LOAD Dec 13 07:31:34.726000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d38 items=0 ppid=1801 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830396662656433356365366633303138313238386538656331663537 Dec 13 07:31:34.737000 audit: BPF prog-id=83 op=UNLOAD Dec 13 07:31:34.738000 audit: BPF prog-id=78 op=UNLOAD Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:34.738000 audit: BPF prog-id=84 op=LOAD Dec 13 07:31:34.738000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e6148 items=0 ppid=1801 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:34.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830396662656433356365366633303138313238386538656331663537 Dec 13 07:31:34.750351 env[1198]: time="2024-12-13T07:31:34.750305280Z" level=info msg="StartContainer for \"eedfec96e29fe43e6393f3ca526b2d0b6623f266b43f06928e408bc66a3d7642\" returns successfully" Dec 13 07:31:34.793270 env[1198]: time="2024-12-13T07:31:34.793206197Z" level=info msg="StartContainer for \"ff239643352004f74aae24b8fdb072833d5d083f1360794919a180abd6f7cc6d\" returns successfully" Dec 13 07:31:34.812313 env[1198]: time="2024-12-13T07:31:34.812232053Z" level=info msg="StartContainer for \"809fbed35ce6f30181288e8ec1f57bfd33c416906af91be1d9a7937265c31af6\" returns successfully" Dec 13 07:31:35.296840 kubelet[1739]: E1213 07:31:35.296799 1739 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.230.40.198:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:35.733707 kubelet[1739]: W1213 07:31:35.733549 1739 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.40.198:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-9sek4.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:35.734025 kubelet[1739]: E1213 07:31:35.733991 1739 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.230.40.198:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-9sek4.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.40.198:6443: connect: connection refused Dec 13 07:31:36.329561 kubelet[1739]: I1213 07:31:36.329502 1739 kubelet_node_status.go:73] "Attempting to register node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:36.458000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:36.458000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00047a930 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:36.458000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:36.459000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:36.459000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0002f9000 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:36.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:37.984000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:37.988638 kernel: kauditd_printk_skb: 626 callbacks suppressed Dec 13 07:31:37.988720 kernel: audit: type=1400 audit(1734075097.984:537): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:37.984000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003bb6900 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:37.984000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.011831 kernel: audit: type=1300 audit(1734075097.984:537): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003bb6900 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:38.011989 kernel: audit: type=1327 audit(1734075097.984:537): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.012039 kernel: audit: type=1400 audit(1734075097.986:538): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:37.986000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:37.986000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0034cea20 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:38.022059 kernel: audit: type=1300 audit(1734075097.986:538): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0034cea20 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:37.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.030801 kernel: audit: type=1327 audit(1734075097.986:538): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:37.987000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:37.987000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006cf2270 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:38.045487 kernel: audit: type=1400 audit(1734075097.987:539): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:38.045556 kernel: audit: type=1300 audit(1734075097.987:539): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006cf2270 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:37.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:37.998000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:38.064138 kernel: audit: type=1327 audit(1734075097.987:539): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.064224 kernel: audit: type=1400 audit(1734075097.998:540): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:37.998000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c003bb6ed0 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:37.998000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.152000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:38.152000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5a a1=c003cf2740 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:38.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.152000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:38.152000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5a a1=c00365c150 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:31:38.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:31:38.194949 kubelet[1739]: E1213 07:31:38.194900 1739 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-9sek4.gb1.brightbox.com\" not found" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:38.322941 kubelet[1739]: I1213 07:31:38.322810 1739 kubelet_node_status.go:76] "Successfully registered node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:38.336606 kubelet[1739]: E1213 07:31:38.336551 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:38.375865 kubelet[1739]: E1213 07:31:38.375649 1739 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-9sek4.gb1.brightbox.com.1810ac1c171ee1f3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-9sek4.gb1.brightbox.com,UID:srv-9sek4.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-9sek4.gb1.brightbox.com,},FirstTimestamp:2024-12-13 07:31:33.184602611 +0000 UTC m=+0.463011461,LastTimestamp:2024-12-13 07:31:33.184602611 +0000 UTC m=+0.463011461,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-9sek4.gb1.brightbox.com,}" Dec 13 07:31:38.436994 kubelet[1739]: E1213 07:31:38.436951 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:38.537588 kubelet[1739]: E1213 07:31:38.537510 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:38.638021 kubelet[1739]: E1213 07:31:38.637853 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:38.738153 kubelet[1739]: E1213 07:31:38.738034 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:38.838919 kubelet[1739]: E1213 07:31:38.838848 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:38.939838 kubelet[1739]: E1213 07:31:38.939618 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.040472 kubelet[1739]: E1213 07:31:39.040392 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.141206 kubelet[1739]: E1213 07:31:39.141138 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.241651 kubelet[1739]: E1213 07:31:39.241608 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.342858 kubelet[1739]: E1213 07:31:39.342750 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.443392 kubelet[1739]: E1213 07:31:39.443339 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.543700 kubelet[1739]: E1213 07:31:39.543554 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.644893 kubelet[1739]: E1213 07:31:39.644833 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.745376 kubelet[1739]: E1213 07:31:39.745302 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.846420 kubelet[1739]: E1213 07:31:39.846264 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:39.947603 kubelet[1739]: E1213 07:31:39.947544 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.048243 kubelet[1739]: E1213 07:31:40.048183 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.149405 kubelet[1739]: E1213 07:31:40.149253 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.250589 kubelet[1739]: E1213 07:31:40.250547 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.252637 systemd[1]: Reloading. Dec 13 07:31:40.351827 kubelet[1739]: E1213 07:31:40.351782 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.363018 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-12-13T07:31:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 07:31:40.363656 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-12-13T07:31:40Z" level=info msg="torcx already run" Dec 13 07:31:40.453113 kubelet[1739]: E1213 07:31:40.452986 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.470277 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 07:31:40.470574 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 07:31:40.497722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 07:31:40.554375 kubelet[1739]: E1213 07:31:40.554328 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.607000 audit: BPF prog-id=85 op=LOAD Dec 13 07:31:40.607000 audit: BPF prog-id=73 op=UNLOAD Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit: BPF prog-id=86 op=LOAD Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.610000 audit: BPF prog-id=87 op=LOAD Dec 13 07:31:40.610000 audit: BPF prog-id=46 op=UNLOAD Dec 13 07:31:40.610000 audit: BPF prog-id=47 op=UNLOAD Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.612000 audit: BPF prog-id=88 op=LOAD Dec 13 07:31:40.612000 audit: BPF prog-id=48 op=UNLOAD Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.614000 audit: BPF prog-id=89 op=LOAD Dec 13 07:31:40.614000 audit: BPF prog-id=61 op=UNLOAD Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.618000 audit: BPF prog-id=90 op=LOAD Dec 13 07:31:40.618000 audit: BPF prog-id=49 op=UNLOAD Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.619000 audit: BPF prog-id=91 op=LOAD Dec 13 07:31:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.620000 audit: BPF prog-id=92 op=LOAD Dec 13 07:31:40.620000 audit: BPF prog-id=50 op=UNLOAD Dec 13 07:31:40.620000 audit: BPF prog-id=51 op=UNLOAD Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit: BPF prog-id=93 op=LOAD Dec 13 07:31:40.624000 audit: BPF prog-id=52 op=UNLOAD Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit: BPF prog-id=94 op=LOAD Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.626000 audit: BPF prog-id=95 op=LOAD Dec 13 07:31:40.626000 audit: BPF prog-id=53 op=UNLOAD Dec 13 07:31:40.626000 audit: BPF prog-id=54 op=UNLOAD Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.629000 audit: BPF prog-id=96 op=LOAD Dec 13 07:31:40.629000 audit: BPF prog-id=77 op=UNLOAD Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit: BPF prog-id=97 op=LOAD Dec 13 07:31:40.632000 audit: BPF prog-id=55 op=UNLOAD Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit: BPF prog-id=98 op=LOAD Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.632000 audit: BPF prog-id=99 op=LOAD Dec 13 07:31:40.632000 audit: BPF prog-id=56 op=UNLOAD Dec 13 07:31:40.632000 audit: BPF prog-id=57 op=UNLOAD Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.633000 audit: BPF prog-id=100 op=LOAD Dec 13 07:31:40.633000 audit: BPF prog-id=65 op=UNLOAD Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.635000 audit: BPF prog-id=101 op=LOAD Dec 13 07:31:40.635000 audit: BPF prog-id=58 op=UNLOAD Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.636000 audit: BPF prog-id=102 op=LOAD Dec 13 07:31:40.636000 audit: BPF prog-id=59 op=UNLOAD Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.637000 audit: BPF prog-id=103 op=LOAD Dec 13 07:31:40.637000 audit: BPF prog-id=79 op=UNLOAD Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.640000 audit: BPF prog-id=104 op=LOAD Dec 13 07:31:40.641000 audit: BPF prog-id=60 op=UNLOAD Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:40.643000 audit: BPF prog-id=105 op=LOAD Dec 13 07:31:40.643000 audit: BPF prog-id=69 op=UNLOAD Dec 13 07:31:40.655644 kubelet[1739]: E1213 07:31:40.655548 1739 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-9sek4.gb1.brightbox.com\" not found" Dec 13 07:31:40.678279 systemd[1]: Stopping kubelet.service... Dec 13 07:31:40.688411 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 07:31:40.688716 systemd[1]: Stopped kubelet.service. Dec 13 07:31:40.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:40.691488 systemd[1]: Starting kubelet.service... Dec 13 07:31:41.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:41.896759 systemd[1]: Started kubelet.service. Dec 13 07:31:42.012527 kubelet[2079]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 07:31:42.012527 kubelet[2079]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 07:31:42.013092 kubelet[2079]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 07:31:42.013092 kubelet[2079]: I1213 07:31:42.012829 2079 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 07:31:42.022209 kubelet[2079]: I1213 07:31:42.021312 2079 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 07:31:42.022209 kubelet[2079]: I1213 07:31:42.021343 2079 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 07:31:42.022209 kubelet[2079]: I1213 07:31:42.021718 2079 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 07:31:42.024420 kubelet[2079]: I1213 07:31:42.023753 2079 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 07:31:42.058672 kubelet[2079]: I1213 07:31:42.058610 2079 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 07:31:42.071295 kubelet[2079]: I1213 07:31:42.071181 2079 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 07:31:42.072691 kubelet[2079]: I1213 07:31:42.071530 2079 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 07:31:42.072691 kubelet[2079]: I1213 07:31:42.071592 2079 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-9sek4.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 07:31:42.072691 kubelet[2079]: I1213 07:31:42.071828 2079 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 07:31:42.072691 kubelet[2079]: I1213 07:31:42.071844 2079 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 07:31:42.073130 kubelet[2079]: I1213 07:31:42.071904 2079 state_mem.go:36] "Initialized new in-memory state store" Dec 13 07:31:42.076267 kubelet[2079]: I1213 07:31:42.076231 2079 kubelet.go:400] "Attempting to sync node with API server" Dec 13 07:31:42.077683 kubelet[2079]: I1213 07:31:42.076765 2079 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 07:31:42.077683 kubelet[2079]: I1213 07:31:42.076840 2079 kubelet.go:312] "Adding apiserver pod source" Dec 13 07:31:42.077683 kubelet[2079]: I1213 07:31:42.076865 2079 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 07:31:42.084043 kubelet[2079]: I1213 07:31:42.082075 2079 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 07:31:42.114035 kubelet[2079]: I1213 07:31:42.113580 2079 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 07:31:42.114350 kubelet[2079]: I1213 07:31:42.114188 2079 server.go:1264] "Started kubelet" Dec 13 07:31:42.116622 kubelet[2079]: I1213 07:31:42.116163 2079 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 07:31:42.117864 kubelet[2079]: I1213 07:31:42.117838 2079 server.go:455] "Adding debug handlers to kubelet server" Dec 13 07:31:42.117000 audit[2079]: AVC avc: denied { mac_admin } for pid=2079 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:42.117000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 07:31:42.117000 audit[2079]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6e3c0 a1=c000a43188 a2=c000b6e390 a3=25 items=0 ppid=1 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:42.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 07:31:42.119852 kubelet[2079]: I1213 07:31:42.119803 2079 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 07:31:42.119000 audit[2079]: AVC avc: denied { mac_admin } for pid=2079 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:42.119000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 07:31:42.119000 audit[2079]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b36780 a1=c000a431a0 a2=c000b6e450 a3=25 items=0 ppid=1 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:42.119000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 07:31:42.120409 kubelet[2079]: I1213 07:31:42.120382 2079 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 07:31:42.120586 kubelet[2079]: I1213 07:31:42.120563 2079 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 07:31:42.121325 kubelet[2079]: I1213 07:31:42.121207 2079 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 07:31:42.122588 kubelet[2079]: I1213 07:31:42.121801 2079 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 07:31:42.134204 kubelet[2079]: I1213 07:31:42.134154 2079 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 07:31:42.135059 kubelet[2079]: I1213 07:31:42.134737 2079 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 07:31:42.135317 kubelet[2079]: I1213 07:31:42.135254 2079 reconciler.go:26] "Reconciler: start to sync state" Dec 13 07:31:42.137843 kubelet[2079]: I1213 07:31:42.137812 2079 factory.go:221] Registration of the systemd container factory successfully Dec 13 07:31:42.138124 kubelet[2079]: I1213 07:31:42.138094 2079 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 07:31:42.149978 kubelet[2079]: I1213 07:31:42.149351 2079 factory.go:221] Registration of the containerd container factory successfully Dec 13 07:31:42.208011 kubelet[2079]: I1213 07:31:42.206051 2079 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 07:31:42.229299 kubelet[2079]: I1213 07:31:42.228622 2079 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 07:31:42.229299 kubelet[2079]: I1213 07:31:42.228667 2079 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 07:31:42.229299 kubelet[2079]: I1213 07:31:42.228691 2079 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 07:31:42.229299 kubelet[2079]: E1213 07:31:42.228748 2079 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 07:31:42.268720 kubelet[2079]: I1213 07:31:42.268673 2079 kubelet_node_status.go:73] "Attempting to register node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.284840 kubelet[2079]: I1213 07:31:42.284447 2079 kubelet_node_status.go:112] "Node was previously registered" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.284840 kubelet[2079]: I1213 07:31:42.284616 2079 kubelet_node_status.go:76] "Successfully registered node" node="srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.314342 kubelet[2079]: I1213 07:31:42.314312 2079 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 07:31:42.314620 kubelet[2079]: I1213 07:31:42.314595 2079 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 07:31:42.314737 kubelet[2079]: I1213 07:31:42.314717 2079 state_mem.go:36] "Initialized new in-memory state store" Dec 13 07:31:42.315132 kubelet[2079]: I1213 07:31:42.315106 2079 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 07:31:42.315335 kubelet[2079]: I1213 07:31:42.315284 2079 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 07:31:42.315456 kubelet[2079]: I1213 07:31:42.315435 2079 policy_none.go:49] "None policy: Start" Dec 13 07:31:42.317749 kubelet[2079]: I1213 07:31:42.317719 2079 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 07:31:42.317749 kubelet[2079]: I1213 07:31:42.317759 2079 state_mem.go:35] "Initializing new in-memory state store" Dec 13 07:31:42.318068 kubelet[2079]: I1213 07:31:42.318043 2079 state_mem.go:75] "Updated machine memory state" Dec 13 07:31:42.325692 kubelet[2079]: I1213 07:31:42.325657 2079 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 07:31:42.324000 audit[2079]: AVC avc: denied { mac_admin } for pid=2079 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:42.324000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 07:31:42.324000 audit[2079]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d23020 a1=c000f6b860 a2=c000d22ff0 a3=25 items=0 ppid=1 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:42.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 07:31:42.326231 kubelet[2079]: I1213 07:31:42.325732 2079 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 07:31:42.326231 kubelet[2079]: I1213 07:31:42.325944 2079 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 07:31:42.326751 kubelet[2079]: I1213 07:31:42.326685 2079 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 07:31:42.329147 kubelet[2079]: I1213 07:31:42.328980 2079 topology_manager.go:215] "Topology Admit Handler" podUID="e673e95216bd6b0d2a2f4494c2016667" podNamespace="kube-system" podName="kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.330397 kubelet[2079]: I1213 07:31:42.330017 2079 topology_manager.go:215] "Topology Admit Handler" podUID="e15e711fc954271e08ada4f29e6dcd03" podNamespace="kube-system" podName="kube-scheduler-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.330397 kubelet[2079]: I1213 07:31:42.330149 2079 topology_manager.go:215] "Topology Admit Handler" podUID="122ad72fbd46fb77753ddefc8a1a39d5" podNamespace="kube-system" podName="kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342029 kubelet[2079]: I1213 07:31:42.341980 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-ca-certs\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342116 kubelet[2079]: I1213 07:31:42.342032 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-flexvolume-dir\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342116 kubelet[2079]: I1213 07:31:42.342061 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-kubeconfig\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342116 kubelet[2079]: I1213 07:31:42.342086 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342262 kubelet[2079]: I1213 07:31:42.342117 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e15e711fc954271e08ada4f29e6dcd03-kubeconfig\") pod \"kube-scheduler-srv-9sek4.gb1.brightbox.com\" (UID: \"e15e711fc954271e08ada4f29e6dcd03\") " pod="kube-system/kube-scheduler-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342262 kubelet[2079]: I1213 07:31:42.342141 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e673e95216bd6b0d2a2f4494c2016667-k8s-certs\") pod \"kube-controller-manager-srv-9sek4.gb1.brightbox.com\" (UID: \"e673e95216bd6b0d2a2f4494c2016667\") " pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342262 kubelet[2079]: I1213 07:31:42.342164 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/122ad72fbd46fb77753ddefc8a1a39d5-ca-certs\") pod \"kube-apiserver-srv-9sek4.gb1.brightbox.com\" (UID: \"122ad72fbd46fb77753ddefc8a1a39d5\") " pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342262 kubelet[2079]: I1213 07:31:42.342187 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/122ad72fbd46fb77753ddefc8a1a39d5-k8s-certs\") pod \"kube-apiserver-srv-9sek4.gb1.brightbox.com\" (UID: \"122ad72fbd46fb77753ddefc8a1a39d5\") " pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.342262 kubelet[2079]: I1213 07:31:42.342223 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/122ad72fbd46fb77753ddefc8a1a39d5-usr-share-ca-certificates\") pod \"kube-apiserver-srv-9sek4.gb1.brightbox.com\" (UID: \"122ad72fbd46fb77753ddefc8a1a39d5\") " pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" Dec 13 07:31:42.369690 kubelet[2079]: W1213 07:31:42.368655 2079 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 07:31:42.369690 kubelet[2079]: W1213 07:31:42.368926 2079 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 07:31:42.373927 kubelet[2079]: W1213 07:31:42.373622 2079 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 07:31:43.046000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.051611 kernel: kauditd_printk_skb: 266 callbacks suppressed Dec 13 07:31:43.051797 kernel: audit: type=1400 audit(1734075103.046:792): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.046000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eea820 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.065171 kernel: audit: type=1300 audit(1734075103.046:792): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eea820 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.065327 kernel: audit: type=1327 audit(1734075103.046:792): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.050000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.078797 kernel: audit: type=1400 audit(1734075103.050:793): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.050000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eea9e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.081018 kubelet[2079]: I1213 07:31:43.080964 2079 apiserver.go:52] "Watching apiserver" Dec 13 07:31:43.087813 kernel: audit: type=1300 audit(1734075103.050:793): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eea9e0 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.099797 kernel: audit: type=1327 audit(1734075103.050:793): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.054000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.110918 kernel: audit: type=1400 audit(1734075103.054:794): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.054000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f7a200 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.119811 kernel: audit: type=1300 audit(1734075103.054:794): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f7a200 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.132816 kernel: audit: type=1327 audit(1734075103.054:794): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.056000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.135417 kubelet[2079]: I1213 07:31:43.135383 2079 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 07:31:43.056000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f7a220 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:43.141878 kernel: audit: type=1400 audit(1734075103.056:795): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:31:43.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:43.418698 kubelet[2079]: I1213 07:31:43.418519 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-9sek4.gb1.brightbox.com" podStartSLOduration=1.4184489550000001 podStartE2EDuration="1.418448955s" podCreationTimestamp="2024-12-13 07:31:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 07:31:43.383794824 +0000 UTC m=+1.473649793" watchObservedRunningTime="2024-12-13 07:31:43.418448955 +0000 UTC m=+1.508303923" Dec 13 07:31:43.447615 kubelet[2079]: I1213 07:31:43.447548 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-9sek4.gb1.brightbox.com" podStartSLOduration=1.447516265 podStartE2EDuration="1.447516265s" podCreationTimestamp="2024-12-13 07:31:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 07:31:43.43156405 +0000 UTC m=+1.521419022" watchObservedRunningTime="2024-12-13 07:31:43.447516265 +0000 UTC m=+1.537371308" Dec 13 07:31:43.473684 kubelet[2079]: I1213 07:31:43.473617 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-9sek4.gb1.brightbox.com" podStartSLOduration=1.473595676 podStartE2EDuration="1.473595676s" podCreationTimestamp="2024-12-13 07:31:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 07:31:43.451748979 +0000 UTC m=+1.541603962" watchObservedRunningTime="2024-12-13 07:31:43.473595676 +0000 UTC m=+1.563450641" Dec 13 07:31:47.899148 sudo[1379]: pam_unix(sudo:session): session closed for user root Dec 13 07:31:47.899000 audit[1379]: USER_END pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:47.899000 audit[1379]: CRED_DISP pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 07:31:48.045671 sshd[1376]: pam_unix(sshd:session): session closed for user core Dec 13 07:31:48.047000 audit[1376]: USER_END pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:48.051734 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 07:31:48.051904 kernel: audit: type=1106 audit(1734075108.047:798): pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:48.050000 audit[1376]: CRED_DISP pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:48.059680 systemd[1]: sshd@8-10.230.40.198:22-139.178.89.65:56950.service: Deactivated successfully. Dec 13 07:31:48.061064 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 07:31:48.061296 systemd[1]: session-9.scope: Consumed 5.838s CPU time. Dec 13 07:31:48.063503 systemd-logind[1185]: Session 9 logged out. Waiting for processes to exit. Dec 13 07:31:48.065241 kernel: audit: type=1104 audit(1734075108.050:799): pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:31:48.065331 kernel: audit: type=1131 audit(1734075108.059:800): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.40.198:22-139.178.89.65:56950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:48.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.40.198:22-139.178.89.65:56950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:48.066363 systemd-logind[1185]: Removed session 9. Dec 13 07:31:54.369418 systemd[1]: Started sshd@12-10.230.40.198:22-36.155.130.1:52454.service. Dec 13 07:31:54.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.40.198:22-36.155.130.1:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:54.380070 kernel: audit: type=1130 audit(1734075114.369:801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.40.198:22-36.155.130.1:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:54.422000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526953 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 07:31:54.430046 kernel: audit: type=1400 audit(1734075114.422:802): avc: denied { watch } for pid=1952 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526953 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 07:31:54.430178 kernel: audit: type=1300 audit(1734075114.422:802): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c6ad00 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:54.422000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c6ad00 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:31:54.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:54.460845 kernel: audit: type=1327 audit(1734075114.422:802): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:31:54.981853 kubelet[2079]: I1213 07:31:54.981786 2079 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 07:31:54.982977 env[1198]: time="2024-12-13T07:31:54.982825703Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 07:31:54.984154 kubelet[2079]: I1213 07:31:54.983277 2079 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 07:31:55.800477 kubelet[2079]: I1213 07:31:55.800398 2079 topology_manager.go:215] "Topology Admit Handler" podUID="27a68413-0700-4d44-b157-1a788ca3f8ac" podNamespace="kube-system" podName="kube-proxy-qh77x" Dec 13 07:31:55.810647 systemd[1]: Created slice kubepods-besteffort-pod27a68413_0700_4d44_b157_1a788ca3f8ac.slice. Dec 13 07:31:55.904574 kubelet[2079]: I1213 07:31:55.904507 2079 topology_manager.go:215] "Topology Admit Handler" podUID="846816af-ed32-4957-b20a-2879adfc526c" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-7hx2r" Dec 13 07:31:55.912131 systemd[1]: Created slice kubepods-besteffort-pod846816af_ed32_4957_b20a_2879adfc526c.slice. Dec 13 07:31:55.926449 kubelet[2079]: I1213 07:31:55.926384 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/27a68413-0700-4d44-b157-1a788ca3f8ac-lib-modules\") pod \"kube-proxy-qh77x\" (UID: \"27a68413-0700-4d44-b157-1a788ca3f8ac\") " pod="kube-system/kube-proxy-qh77x" Dec 13 07:31:55.926778 kubelet[2079]: I1213 07:31:55.926732 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zd7q9\" (UniqueName: \"kubernetes.io/projected/27a68413-0700-4d44-b157-1a788ca3f8ac-kube-api-access-zd7q9\") pod \"kube-proxy-qh77x\" (UID: \"27a68413-0700-4d44-b157-1a788ca3f8ac\") " pod="kube-system/kube-proxy-qh77x" Dec 13 07:31:55.926944 kubelet[2079]: I1213 07:31:55.926906 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/27a68413-0700-4d44-b157-1a788ca3f8ac-xtables-lock\") pod \"kube-proxy-qh77x\" (UID: \"27a68413-0700-4d44-b157-1a788ca3f8ac\") " pod="kube-system/kube-proxy-qh77x" Dec 13 07:31:55.927122 kubelet[2079]: I1213 07:31:55.927073 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/27a68413-0700-4d44-b157-1a788ca3f8ac-kube-proxy\") pod \"kube-proxy-qh77x\" (UID: \"27a68413-0700-4d44-b157-1a788ca3f8ac\") " pod="kube-system/kube-proxy-qh77x" Dec 13 07:31:56.027431 kubelet[2079]: I1213 07:31:56.027368 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lj8ph\" (UniqueName: \"kubernetes.io/projected/846816af-ed32-4957-b20a-2879adfc526c-kube-api-access-lj8ph\") pod \"tigera-operator-7bc55997bb-7hx2r\" (UID: \"846816af-ed32-4957-b20a-2879adfc526c\") " pod="tigera-operator/tigera-operator-7bc55997bb-7hx2r" Dec 13 07:31:56.028144 kubelet[2079]: I1213 07:31:56.027487 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/846816af-ed32-4957-b20a-2879adfc526c-var-lib-calico\") pod \"tigera-operator-7bc55997bb-7hx2r\" (UID: \"846816af-ed32-4957-b20a-2879adfc526c\") " pod="tigera-operator/tigera-operator-7bc55997bb-7hx2r" Dec 13 07:31:56.122320 env[1198]: time="2024-12-13T07:31:56.122166150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qh77x,Uid:27a68413-0700-4d44-b157-1a788ca3f8ac,Namespace:kube-system,Attempt:0,}" Dec 13 07:31:56.161845 env[1198]: time="2024-12-13T07:31:56.161656417Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:31:56.161845 env[1198]: time="2024-12-13T07:31:56.161744614Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:31:56.161845 env[1198]: time="2024-12-13T07:31:56.161789414Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:31:56.162587 env[1198]: time="2024-12-13T07:31:56.162516203Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94d42c51be220d4434893e2d41e3b9377d9cf0fa98471548d5206bec05f0612c pid=2166 runtime=io.containerd.runc.v2 Dec 13 07:31:56.193246 systemd[1]: Started cri-containerd-94d42c51be220d4434893e2d41e3b9377d9cf0fa98471548d5206bec05f0612c.scope. Dec 13 07:31:56.216875 env[1198]: time="2024-12-13T07:31:56.216817498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-7hx2r,Uid:846816af-ed32-4957-b20a-2879adfc526c,Namespace:tigera-operator,Attempt:0,}" Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.226910 kernel: audit: type=1400 audit(1734075116.218:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237285 kernel: audit: type=1400 audit(1734075116.218:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237374 kernel: audit: type=1400 audit(1734075116.218:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.245902 kernel: audit: type=1400 audit(1734075116.218:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.259136 kernel: audit: type=1400 audit(1734075116.218:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.259266 kernel: audit: type=1400 audit(1734075116.218:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.218000 audit: BPF prog-id=106 op=LOAD Dec 13 07:31:56.226000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.226000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2166 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643432633531626532323064343433343839336532643431653362 Dec 13 07:31:56.226000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.226000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2166 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643432633531626532323064343433343839336532643431653362 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit: BPF prog-id=107 op=LOAD Dec 13 07:31:56.236000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c00038db70 items=0 ppid=2166 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643432633531626532323064343433343839336532643431653362 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.236000 audit: BPF prog-id=108 op=LOAD Dec 13 07:31:56.236000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c00038dbb8 items=0 ppid=2166 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643432633531626532323064343433343839336532643431653362 Dec 13 07:31:56.237000 audit: BPF prog-id=108 op=UNLOAD Dec 13 07:31:56.237000 audit: BPF prog-id=107 op=UNLOAD Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.237000 audit: BPF prog-id=109 op=LOAD Dec 13 07:31:56.237000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c00038dfc8 items=0 ppid=2166 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934643432633531626532323064343433343839336532643431653362 Dec 13 07:31:56.284940 env[1198]: time="2024-12-13T07:31:56.284878875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qh77x,Uid:27a68413-0700-4d44-b157-1a788ca3f8ac,Namespace:kube-system,Attempt:0,} returns sandbox id \"94d42c51be220d4434893e2d41e3b9377d9cf0fa98471548d5206bec05f0612c\"" Dec 13 07:31:56.285995 env[1198]: time="2024-12-13T07:31:56.285308178Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:31:56.285995 env[1198]: time="2024-12-13T07:31:56.285377339Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:31:56.285995 env[1198]: time="2024-12-13T07:31:56.285396334Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:31:56.291022 env[1198]: time="2024-12-13T07:31:56.285806969Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73c30e4743e92d5f283da5590f3497876ef23036d93cb7cd68e2ed93b81358af pid=2202 runtime=io.containerd.runc.v2 Dec 13 07:31:56.296442 env[1198]: time="2024-12-13T07:31:56.296398261Z" level=info msg="CreateContainer within sandbox \"94d42c51be220d4434893e2d41e3b9377d9cf0fa98471548d5206bec05f0612c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 07:31:56.317882 systemd[1]: Started cri-containerd-73c30e4743e92d5f283da5590f3497876ef23036d93cb7cd68e2ed93b81358af.scope. Dec 13 07:31:56.331198 env[1198]: time="2024-12-13T07:31:56.331101533Z" level=info msg="CreateContainer within sandbox \"94d42c51be220d4434893e2d41e3b9377d9cf0fa98471548d5206bec05f0612c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3af3033bc6d02b27782be53c23c49affdf6340eb0449a52a15f528658cbdc6da\"" Dec 13 07:31:56.334437 env[1198]: time="2024-12-13T07:31:56.334400854Z" level=info msg="StartContainer for \"3af3033bc6d02b27782be53c23c49affdf6340eb0449a52a15f528658cbdc6da\"" Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit: BPF prog-id=110 op=LOAD Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2202 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633330653437343365393264356632383364613535393066333439 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2202 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633330653437343365393264356632383364613535393066333439 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.360000 audit: BPF prog-id=111 op=LOAD Dec 13 07:31:56.360000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001beff0 items=0 ppid=2202 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633330653437343365393264356632383364613535393066333439 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit: BPF prog-id=112 op=LOAD Dec 13 07:31:56.361000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bf038 items=0 ppid=2202 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633330653437343365393264356632383364613535393066333439 Dec 13 07:31:56.361000 audit: BPF prog-id=112 op=UNLOAD Dec 13 07:31:56.361000 audit: BPF prog-id=111 op=UNLOAD Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { perfmon } for pid=2218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit[2218]: AVC avc: denied { bpf } for pid=2218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.361000 audit: BPF prog-id=113 op=LOAD Dec 13 07:31:56.361000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bf448 items=0 ppid=2202 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633330653437343365393264356632383364613535393066333439 Dec 13 07:31:56.389486 systemd[1]: Started cri-containerd-3af3033bc6d02b27782be53c23c49affdf6340eb0449a52a15f528658cbdc6da.scope. Dec 13 07:31:56.415947 env[1198]: time="2024-12-13T07:31:56.415889378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-7hx2r,Uid:846816af-ed32-4957-b20a-2879adfc526c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"73c30e4743e92d5f283da5590f3497876ef23036d93cb7cd68e2ed93b81358af\"" Dec 13 07:31:56.422065 env[1198]: time="2024-12-13T07:31:56.420796658Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7efe5de364d8 items=0 ppid=2166 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663330333362633664303262323737383262653533633233633439 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.441000 audit: BPF prog-id=114 op=LOAD Dec 13 07:31:56.441000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002183c8 items=0 ppid=2166 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663330333362633664303262323737383262653533633233633439 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit: BPF prog-id=115 op=LOAD Dec 13 07:31:56.442000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000218418 items=0 ppid=2166 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663330333362633664303262323737383262653533633233633439 Dec 13 07:31:56.442000 audit: BPF prog-id=115 op=UNLOAD Dec 13 07:31:56.442000 audit: BPF prog-id=114 op=UNLOAD Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:31:56.442000 audit: BPF prog-id=116 op=LOAD Dec 13 07:31:56.442000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002184a8 items=0 ppid=2166 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663330333362633664303262323737383262653533633233633439 Dec 13 07:31:56.464961 env[1198]: time="2024-12-13T07:31:56.464897027Z" level=info msg="StartContainer for \"3af3033bc6d02b27782be53c23c49affdf6340eb0449a52a15f528658cbdc6da\" returns successfully" Dec 13 07:31:56.832000 audit[2300]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.832000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2deb6420 a2=0 a3=7ffd2deb640c items=0 ppid=2260 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 07:31:56.834000 audit[2301]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:56.834000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd35c51c50 a2=0 a3=7ffd35c51c3c items=0 ppid=2260 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 07:31:56.835000 audit[2302]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.835000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdbfeb510 a2=0 a3=7ffcdbfeb4fc items=0 ppid=2260 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 07:31:56.836000 audit[2303]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:56.836000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0f5980b0 a2=0 a3=7ffe0f59809c items=0 ppid=2260 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 07:31:56.836000 audit[2304]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.836000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd282e5a40 a2=0 a3=7ffd282e5a2c items=0 ppid=2260 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 07:31:56.838000 audit[2305]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:56.838000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7b8567c0 a2=0 a3=7ffc7b8567ac items=0 ppid=2260 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 07:31:56.945000 audit[2306]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.945000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe7927d530 a2=0 a3=7ffe7927d51c items=0 ppid=2260 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 07:31:56.950000 audit[2308]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.950000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb8fa2380 a2=0 a3=7ffeb8fa236c items=0 ppid=2260 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 07:31:56.956000 audit[2311]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.956000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc56ce0fd0 a2=0 a3=7ffc56ce0fbc items=0 ppid=2260 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 07:31:56.958000 audit[2312]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.958000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6663c2c0 a2=0 a3=7ffc6663c2ac items=0 ppid=2260 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 07:31:56.962000 audit[2314]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.962000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc91a23b0 a2=0 a3=7ffdc91a239c items=0 ppid=2260 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 07:31:56.964000 audit[2315]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.964000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc3b7ed30 a2=0 a3=7ffdc3b7ed1c items=0 ppid=2260 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 07:31:56.968000 audit[2317]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.968000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc66f4f7e0 a2=0 a3=7ffc66f4f7cc items=0 ppid=2260 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 07:31:56.974000 audit[2320]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.974000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7938aa50 a2=0 a3=7ffd7938aa3c items=0 ppid=2260 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 07:31:56.977000 audit[2321]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.977000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebb213320 a2=0 a3=7ffebb21330c items=0 ppid=2260 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 07:31:56.981000 audit[2323]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.981000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc275d6c0 a2=0 a3=7ffcc275d6ac items=0 ppid=2260 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 07:31:56.983000 audit[2324]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.983000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedb0a7570 a2=0 a3=7ffedb0a755c items=0 ppid=2260 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 07:31:56.987000 audit[2326]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.987000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9a399bd0 a2=0 a3=7ffd9a399bbc items=0 ppid=2260 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 07:31:56.993000 audit[2329]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:56.993000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff7abcdb0 a2=0 a3=7ffff7abcd9c items=0 ppid=2260 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:56.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 07:31:57.000000 audit[2332]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:57.000000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb737d380 a2=0 a3=7ffdb737d36c items=0 ppid=2260 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 07:31:57.001000 audit[2333]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:57.001000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff953334e0 a2=0 a3=7fff953334cc items=0 ppid=2260 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 07:31:57.005000 audit[2335]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:57.005000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd8d9e70d0 a2=0 a3=7ffd8d9e70bc items=0 ppid=2260 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 07:31:57.011000 audit[2338]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:57.011000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb9d5ffd0 a2=0 a3=7ffdb9d5ffbc items=0 ppid=2260 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 07:31:57.013000 audit[2339]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:57.013000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdfaab690 a2=0 a3=7fffdfaab67c items=0 ppid=2260 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 07:31:57.017000 audit[2341]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 07:31:57.017000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff70d3af90 a2=0 a3=7fff70d3af7c items=0 ppid=2260 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 07:31:57.049507 systemd[1]: run-containerd-runc-k8s.io-94d42c51be220d4434893e2d41e3b9377d9cf0fa98471548d5206bec05f0612c-runc.Mq58Re.mount: Deactivated successfully. Dec 13 07:31:57.061000 audit[2347]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:31:57.061000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffeca4d35e0 a2=0 a3=7ffeca4d35cc items=0 ppid=2260 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:31:57.073000 audit[2347]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:31:57.073000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffeca4d35e0 a2=0 a3=7ffeca4d35cc items=0 ppid=2260 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:31:57.075000 audit[2353]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.075000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcddff46a0 a2=0 a3=7ffcddff468c items=0 ppid=2260 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 07:31:57.078000 audit[2355]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.078000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcdf091b70 a2=0 a3=7ffcdf091b5c items=0 ppid=2260 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 07:31:57.084000 audit[2358]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.084000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea7176de0 a2=0 a3=7ffea7176dcc items=0 ppid=2260 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 07:31:57.088000 audit[2359]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.088000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd4ac62d0 a2=0 a3=7ffdd4ac62bc items=0 ppid=2260 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 07:31:57.091000 audit[2361]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.091000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3c0cca60 a2=0 a3=7ffc3c0cca4c items=0 ppid=2260 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 07:31:57.093000 audit[2362]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.093000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe332d1280 a2=0 a3=7ffe332d126c items=0 ppid=2260 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 07:31:57.100000 audit[2364]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.100000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe55b2c10 a2=0 a3=7fffe55b2bfc items=0 ppid=2260 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 07:31:57.105000 audit[2367]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.105000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdee834e00 a2=0 a3=7ffdee834dec items=0 ppid=2260 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 07:31:57.108000 audit[2368]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.108000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd3c88080 a2=0 a3=7ffcd3c8806c items=0 ppid=2260 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 07:31:57.113000 audit[2370]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.113000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2d580900 a2=0 a3=7ffe2d5808ec items=0 ppid=2260 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 07:31:57.114000 audit[2371]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.114000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe685164d0 a2=0 a3=7ffe685164bc items=0 ppid=2260 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 07:31:57.118000 audit[2373]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.118000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd64b1f00 a2=0 a3=7fffd64b1eec items=0 ppid=2260 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 07:31:57.124000 audit[2376]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.124000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd82d2e0b0 a2=0 a3=7ffd82d2e09c items=0 ppid=2260 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 07:31:57.130000 audit[2379]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.130000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffab0247e0 a2=0 a3=7fffab0247cc items=0 ppid=2260 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 07:31:57.131000 audit[2380]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.131000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffece7fed70 a2=0 a3=7ffece7fed5c items=0 ppid=2260 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 07:31:57.135000 audit[2382]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.135000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd94ae8d10 a2=0 a3=7ffd94ae8cfc items=0 ppid=2260 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 07:31:57.140000 audit[2385]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.140000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffee9b8bf10 a2=0 a3=7ffee9b8befc items=0 ppid=2260 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 07:31:57.142000 audit[2386]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.142000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75e04de0 a2=0 a3=7ffd75e04dcc items=0 ppid=2260 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 07:31:57.146000 audit[2388]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.146000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc14076aa0 a2=0 a3=7ffc14076a8c items=0 ppid=2260 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 07:31:57.147000 audit[2389]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.147000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7b0e3990 a2=0 a3=7ffd7b0e397c items=0 ppid=2260 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 07:31:57.151000 audit[2391]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.151000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2ca49f00 a2=0 a3=7fff2ca49eec items=0 ppid=2260 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 07:31:57.156000 audit[2394]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 07:31:57.156000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef8bc2dd0 a2=0 a3=7ffef8bc2dbc items=0 ppid=2260 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 07:31:57.160000 audit[2396]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 07:31:57.160000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc76066730 a2=0 a3=7ffc7606671c items=0 ppid=2260 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.160000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:31:57.161000 audit[2396]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 07:31:57.161000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc76066730 a2=0 a3=7ffc7606671c items=0 ppid=2260 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:31:57.161000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:31:57.258751 sshd[1560]: Received disconnect from 36.155.130.1 port 46872:11: Bye Bye [preauth] Dec 13 07:31:57.258751 sshd[1560]: Disconnected from 36.155.130.1 port 46872 [preauth] Dec 13 07:31:57.259617 systemd[1]: sshd@10-10.230.40.198:22-36.155.130.1:46872.service: Deactivated successfully. Dec 13 07:31:57.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.40.198:22-36.155.130.1:46872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:31:58.712122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1745730390.mount: Deactivated successfully. Dec 13 07:31:59.886163 env[1198]: time="2024-12-13T07:31:59.886082357Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:59.888877 env[1198]: time="2024-12-13T07:31:59.888824402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:59.892330 env[1198]: time="2024-12-13T07:31:59.892295494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:59.894049 env[1198]: time="2024-12-13T07:31:59.893999650Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:31:59.895256 env[1198]: time="2024-12-13T07:31:59.895193161Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 07:31:59.900663 env[1198]: time="2024-12-13T07:31:59.900622707Z" level=info msg="CreateContainer within sandbox \"73c30e4743e92d5f283da5590f3497876ef23036d93cb7cd68e2ed93b81358af\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 07:31:59.928808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount554978194.mount: Deactivated successfully. Dec 13 07:31:59.937389 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3078515135.mount: Deactivated successfully. Dec 13 07:31:59.942965 env[1198]: time="2024-12-13T07:31:59.942892453Z" level=info msg="CreateContainer within sandbox \"73c30e4743e92d5f283da5590f3497876ef23036d93cb7cd68e2ed93b81358af\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"11d0427bd121313fb03f4eff094aeda9caee7b47adfe233ce9a17ba1e9aeb6e4\"" Dec 13 07:31:59.944037 env[1198]: time="2024-12-13T07:31:59.943997079Z" level=info msg="StartContainer for \"11d0427bd121313fb03f4eff094aeda9caee7b47adfe233ce9a17ba1e9aeb6e4\"" Dec 13 07:31:59.975344 systemd[1]: Started cri-containerd-11d0427bd121313fb03f4eff094aeda9caee7b47adfe233ce9a17ba1e9aeb6e4.scope. Dec 13 07:32:00.006950 kernel: kauditd_printk_skb: 305 callbacks suppressed Dec 13 07:32:00.007297 kernel: audit: type=1400 audit(1734075120.001:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016804 kernel: audit: type=1400 audit(1734075120.001:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016915 kernel: audit: type=1400 audit(1734075120.001:899): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.026357 kernel: audit: type=1400 audit(1734075120.001:900): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.031803 kernel: audit: type=1400 audit(1734075120.001:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.031901 kernel: audit: type=1400 audit(1734075120.001:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.041296 kernel: audit: type=1400 audit(1734075120.001:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.046670 kernel: audit: type=1400 audit(1734075120.001:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.054832 kernel: audit: type=1400 audit(1734075120.001:905): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.060811 kernel: audit: type=1400 audit(1734075120.010:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.010000 audit: BPF prog-id=117 op=LOAD Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2202 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131643034323762643132313331336662303366346566663039346165 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2202 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131643034323762643132313331336662303366346566663039346165 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.012000 audit: BPF prog-id=118 op=LOAD Dec 13 07:32:00.012000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028a430 items=0 ppid=2202 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131643034323762643132313331336662303366346566663039346165 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.016000 audit: BPF prog-id=119 op=LOAD Dec 13 07:32:00.016000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028a478 items=0 ppid=2202 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:00.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131643034323762643132313331336662303366346566663039346165 Dec 13 07:32:00.020000 audit: BPF prog-id=119 op=UNLOAD Dec 13 07:32:00.020000 audit: BPF prog-id=118 op=UNLOAD Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:00.021000 audit: BPF prog-id=120 op=LOAD Dec 13 07:32:00.021000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028a888 items=0 ppid=2202 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:00.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131643034323762643132313331336662303366346566663039346165 Dec 13 07:32:00.076125 env[1198]: time="2024-12-13T07:32:00.076031984Z" level=info msg="StartContainer for \"11d0427bd121313fb03f4eff094aeda9caee7b47adfe233ce9a17ba1e9aeb6e4\" returns successfully" Dec 13 07:32:00.336749 kubelet[2079]: I1213 07:32:00.336654 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-qh77x" podStartSLOduration=5.336618534 podStartE2EDuration="5.336618534s" podCreationTimestamp="2024-12-13 07:31:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 07:31:57.327498058 +0000 UTC m=+15.417353025" watchObservedRunningTime="2024-12-13 07:32:00.336618534 +0000 UTC m=+18.426473507" Dec 13 07:32:03.113000 audit[2438]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:03.113000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe8135eb80 a2=0 a3=7ffe8135eb6c items=0 ppid=2260 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:03.117000 audit[2438]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:03.117000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8135eb80 a2=0 a3=0 items=0 ppid=2260 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:03.130000 audit[2440]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:03.130000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe48237550 a2=0 a3=7ffe4823753c items=0 ppid=2260 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.130000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:03.135000 audit[2440]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:03.135000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe48237550 a2=0 a3=0 items=0 ppid=2260 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:03.327899 kubelet[2079]: I1213 07:32:03.327796 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-7hx2r" podStartSLOduration=4.850371345 podStartE2EDuration="8.327756244s" podCreationTimestamp="2024-12-13 07:31:55 +0000 UTC" firstStartedPulling="2024-12-13 07:31:56.420073715 +0000 UTC m=+14.509928675" lastFinishedPulling="2024-12-13 07:31:59.897458615 +0000 UTC m=+17.987313574" observedRunningTime="2024-12-13 07:32:00.345902276 +0000 UTC m=+18.435757268" watchObservedRunningTime="2024-12-13 07:32:03.327756244 +0000 UTC m=+21.417611218" Dec 13 07:32:03.328497 kubelet[2079]: I1213 07:32:03.327999 2079 topology_manager.go:215] "Topology Admit Handler" podUID="4430feb1-92a8-4f61-b0a7-8e966cd01734" podNamespace="calico-system" podName="calico-typha-8594b85855-rs28t" Dec 13 07:32:03.338740 systemd[1]: Created slice kubepods-besteffort-pod4430feb1_92a8_4f61_b0a7_8e966cd01734.slice. Dec 13 07:32:03.383886 kubelet[2079]: I1213 07:32:03.383694 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xlpnf\" (UniqueName: \"kubernetes.io/projected/4430feb1-92a8-4f61-b0a7-8e966cd01734-kube-api-access-xlpnf\") pod \"calico-typha-8594b85855-rs28t\" (UID: \"4430feb1-92a8-4f61-b0a7-8e966cd01734\") " pod="calico-system/calico-typha-8594b85855-rs28t" Dec 13 07:32:03.384152 kubelet[2079]: I1213 07:32:03.384121 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4430feb1-92a8-4f61-b0a7-8e966cd01734-tigera-ca-bundle\") pod \"calico-typha-8594b85855-rs28t\" (UID: \"4430feb1-92a8-4f61-b0a7-8e966cd01734\") " pod="calico-system/calico-typha-8594b85855-rs28t" Dec 13 07:32:03.384336 kubelet[2079]: I1213 07:32:03.384304 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4430feb1-92a8-4f61-b0a7-8e966cd01734-typha-certs\") pod \"calico-typha-8594b85855-rs28t\" (UID: \"4430feb1-92a8-4f61-b0a7-8e966cd01734\") " pod="calico-system/calico-typha-8594b85855-rs28t" Dec 13 07:32:03.492808 kubelet[2079]: I1213 07:32:03.492747 2079 topology_manager.go:215] "Topology Admit Handler" podUID="477a7b2c-960a-4d10-a3e5-603fca39843f" podNamespace="calico-system" podName="calico-node-w544t" Dec 13 07:32:03.503701 systemd[1]: Created slice kubepods-besteffort-pod477a7b2c_960a_4d10_a3e5_603fca39843f.slice. Dec 13 07:32:03.586248 kubelet[2079]: I1213 07:32:03.586182 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-var-run-calico\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586480 kubelet[2079]: I1213 07:32:03.586328 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kc7qp\" (UniqueName: \"kubernetes.io/projected/477a7b2c-960a-4d10-a3e5-603fca39843f-kube-api-access-kc7qp\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586480 kubelet[2079]: I1213 07:32:03.586373 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-xtables-lock\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586480 kubelet[2079]: I1213 07:32:03.586418 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-cni-net-dir\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586690 kubelet[2079]: I1213 07:32:03.586473 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-cni-log-dir\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586690 kubelet[2079]: I1213 07:32:03.586532 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-policysync\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586690 kubelet[2079]: I1213 07:32:03.586557 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-var-lib-calico\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586690 kubelet[2079]: I1213 07:32:03.586599 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-flexvol-driver-host\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.586690 kubelet[2079]: I1213 07:32:03.586645 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-lib-modules\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.587029 kubelet[2079]: I1213 07:32:03.586692 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/477a7b2c-960a-4d10-a3e5-603fca39843f-tigera-ca-bundle\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.587029 kubelet[2079]: I1213 07:32:03.586740 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/477a7b2c-960a-4d10-a3e5-603fca39843f-cni-bin-dir\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.587029 kubelet[2079]: I1213 07:32:03.586815 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/477a7b2c-960a-4d10-a3e5-603fca39843f-node-certs\") pod \"calico-node-w544t\" (UID: \"477a7b2c-960a-4d10-a3e5-603fca39843f\") " pod="calico-system/calico-node-w544t" Dec 13 07:32:03.640182 kubelet[2079]: I1213 07:32:03.640035 2079 topology_manager.go:215] "Topology Admit Handler" podUID="afff8102-04e9-47a8-bb52-63e679231697" podNamespace="calico-system" podName="csi-node-driver-ljtmb" Dec 13 07:32:03.640812 kubelet[2079]: E1213 07:32:03.640762 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:03.647474 env[1198]: time="2024-12-13T07:32:03.646650273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8594b85855-rs28t,Uid:4430feb1-92a8-4f61-b0a7-8e966cd01734,Namespace:calico-system,Attempt:0,}" Dec 13 07:32:03.683646 env[1198]: time="2024-12-13T07:32:03.675744226Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:03.683646 env[1198]: time="2024-12-13T07:32:03.675841119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:03.683646 env[1198]: time="2024-12-13T07:32:03.675858925Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:03.683646 env[1198]: time="2024-12-13T07:32:03.676353792Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e15aacfe7589e2d534f572897e4b8d510ad9c0a078270cefb7d3e7a5d9f8fef pid=2451 runtime=io.containerd.runc.v2 Dec 13 07:32:03.688001 kubelet[2079]: I1213 07:32:03.687893 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/afff8102-04e9-47a8-bb52-63e679231697-varrun\") pod \"csi-node-driver-ljtmb\" (UID: \"afff8102-04e9-47a8-bb52-63e679231697\") " pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:03.688001 kubelet[2079]: I1213 07:32:03.687970 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/afff8102-04e9-47a8-bb52-63e679231697-registration-dir\") pod \"csi-node-driver-ljtmb\" (UID: \"afff8102-04e9-47a8-bb52-63e679231697\") " pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:03.690321 kubelet[2079]: I1213 07:32:03.688091 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/afff8102-04e9-47a8-bb52-63e679231697-socket-dir\") pod \"csi-node-driver-ljtmb\" (UID: \"afff8102-04e9-47a8-bb52-63e679231697\") " pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:03.690321 kubelet[2079]: I1213 07:32:03.688157 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/afff8102-04e9-47a8-bb52-63e679231697-kubelet-dir\") pod \"csi-node-driver-ljtmb\" (UID: \"afff8102-04e9-47a8-bb52-63e679231697\") " pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:03.690321 kubelet[2079]: I1213 07:32:03.688226 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4hbvm\" (UniqueName: \"kubernetes.io/projected/afff8102-04e9-47a8-bb52-63e679231697-kube-api-access-4hbvm\") pod \"csi-node-driver-ljtmb\" (UID: \"afff8102-04e9-47a8-bb52-63e679231697\") " pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:03.693306 kubelet[2079]: E1213 07:32:03.693276 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.693464 kubelet[2079]: W1213 07:32:03.693435 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.694944 kubelet[2079]: E1213 07:32:03.693629 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.716006 kubelet[2079]: E1213 07:32:03.715940 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.716175 kubelet[2079]: W1213 07:32:03.716011 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.716175 kubelet[2079]: E1213 07:32:03.716049 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.716634 kubelet[2079]: E1213 07:32:03.716611 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.716715 kubelet[2079]: W1213 07:32:03.716631 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.716715 kubelet[2079]: E1213 07:32:03.716672 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.749870 systemd[1]: Started cri-containerd-5e15aacfe7589e2d534f572897e4b8d510ad9c0a078270cefb7d3e7a5d9f8fef.scope. Dec 13 07:32:03.789567 kubelet[2079]: E1213 07:32:03.789270 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.789567 kubelet[2079]: W1213 07:32:03.789304 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.789567 kubelet[2079]: E1213 07:32:03.789333 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.790523 kubelet[2079]: E1213 07:32:03.790061 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.790523 kubelet[2079]: W1213 07:32:03.790079 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.790523 kubelet[2079]: E1213 07:32:03.790104 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.790523 kubelet[2079]: E1213 07:32:03.790419 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.790523 kubelet[2079]: W1213 07:32:03.790433 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.790523 kubelet[2079]: E1213 07:32:03.790465 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.791109 kubelet[2079]: E1213 07:32:03.791082 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.791109 kubelet[2079]: W1213 07:32:03.791105 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.791246 kubelet[2079]: E1213 07:32:03.791130 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.791608 kubelet[2079]: E1213 07:32:03.791552 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.791608 kubelet[2079]: W1213 07:32:03.791585 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.791965 kubelet[2079]: E1213 07:32:03.791807 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.792061 kubelet[2079]: E1213 07:32:03.792000 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.792061 kubelet[2079]: W1213 07:32:03.792014 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.792395 kubelet[2079]: E1213 07:32:03.792221 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.792395 kubelet[2079]: E1213 07:32:03.792393 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.792530 kubelet[2079]: W1213 07:32:03.792407 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.792838 kubelet[2079]: E1213 07:32:03.792622 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.792919 kubelet[2079]: E1213 07:32:03.792872 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.792919 kubelet[2079]: W1213 07:32:03.792914 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.793255 kubelet[2079]: E1213 07:32:03.793116 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.793333 kubelet[2079]: E1213 07:32:03.793315 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.793406 kubelet[2079]: W1213 07:32:03.793328 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.793664 kubelet[2079]: E1213 07:32:03.793495 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.793765 kubelet[2079]: E1213 07:32:03.793697 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.793765 kubelet[2079]: W1213 07:32:03.793710 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.794095 kubelet[2079]: E1213 07:32:03.793961 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.794196 kubelet[2079]: E1213 07:32:03.794134 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.794196 kubelet[2079]: W1213 07:32:03.794162 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.794568 kubelet[2079]: E1213 07:32:03.794351 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.794652 kubelet[2079]: E1213 07:32:03.794601 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.794652 kubelet[2079]: W1213 07:32:03.794622 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.794984 kubelet[2079]: E1213 07:32:03.794802 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.795070 kubelet[2079]: E1213 07:32:03.795031 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.795070 kubelet[2079]: W1213 07:32:03.795044 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.796526 kubelet[2079]: E1213 07:32:03.795228 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.796526 kubelet[2079]: E1213 07:32:03.795415 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.796526 kubelet[2079]: W1213 07:32:03.795430 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.796526 kubelet[2079]: E1213 07:32:03.795697 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.796526 kubelet[2079]: W1213 07:32:03.795710 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.797106 kubelet[2079]: E1213 07:32:03.796916 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.797106 kubelet[2079]: E1213 07:32:03.796959 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.797296 kubelet[2079]: E1213 07:32:03.797143 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.797296 kubelet[2079]: W1213 07:32:03.797169 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.797511 kubelet[2079]: E1213 07:32:03.797421 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.797511 kubelet[2079]: W1213 07:32:03.797441 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.797511 kubelet[2079]: E1213 07:32:03.797446 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.797511 kubelet[2079]: E1213 07:32:03.797477 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.798250 kubelet[2079]: E1213 07:32:03.798205 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.798250 kubelet[2079]: W1213 07:32:03.798237 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.798566 kubelet[2079]: E1213 07:32:03.798481 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.798566 kubelet[2079]: E1213 07:32:03.798538 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.798566 kubelet[2079]: W1213 07:32:03.798553 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.799074 kubelet[2079]: E1213 07:32:03.798996 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.799162 kubelet[2079]: E1213 07:32:03.799114 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.799162 kubelet[2079]: W1213 07:32:03.799128 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.799399 kubelet[2079]: E1213 07:32:03.799355 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.799938 kubelet[2079]: E1213 07:32:03.799870 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.799938 kubelet[2079]: W1213 07:32:03.799933 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.800165 kubelet[2079]: E1213 07:32:03.800100 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.800582 kubelet[2079]: E1213 07:32:03.800461 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.800582 kubelet[2079]: W1213 07:32:03.800546 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.800713 kubelet[2079]: E1213 07:32:03.800579 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.801024 kubelet[2079]: E1213 07:32:03.800998 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.801257 kubelet[2079]: W1213 07:32:03.801017 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.801257 kubelet[2079]: E1213 07:32:03.801074 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.802197 kubelet[2079]: E1213 07:32:03.802153 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.802286 kubelet[2079]: W1213 07:32:03.802217 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.802738 kubelet[2079]: E1213 07:32:03.802425 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.804308 kubelet[2079]: E1213 07:32:03.804201 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.804381 kubelet[2079]: W1213 07:32:03.804346 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.804381 kubelet[2079]: E1213 07:32:03.804368 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.809000 audit: BPF prog-id=121 op=LOAD Dec 13 07:32:03.810000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.810000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2451 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313561616366653735383965326435333466353732383937653462 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2451 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.812397 env[1198]: time="2024-12-13T07:32:03.812138053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w544t,Uid:477a7b2c-960a-4d10-a3e5-603fca39843f,Namespace:calico-system,Attempt:0,}" Dec 13 07:32:03.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313561616366653735383965326435333466353732383937653462 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.811000 audit: BPF prog-id=122 op=LOAD Dec 13 07:32:03.811000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000285380 items=0 ppid=2451 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313561616366653735383965326435333466353732383937653462 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.812000 audit: BPF prog-id=123 op=LOAD Dec 13 07:32:03.812000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002853c8 items=0 ppid=2451 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313561616366653735383965326435333466353732383937653462 Dec 13 07:32:03.813000 audit: BPF prog-id=123 op=UNLOAD Dec 13 07:32:03.813000 audit: BPF prog-id=122 op=UNLOAD Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.813000 audit: BPF prog-id=124 op=LOAD Dec 13 07:32:03.813000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002857d8 items=0 ppid=2451 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313561616366653735383965326435333466353732383937653462 Dec 13 07:32:03.853111 kubelet[2079]: E1213 07:32:03.853071 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:03.853356 env[1198]: time="2024-12-13T07:32:03.851865302Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:03.853356 env[1198]: time="2024-12-13T07:32:03.851916674Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:03.853356 env[1198]: time="2024-12-13T07:32:03.851932774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:03.853356 env[1198]: time="2024-12-13T07:32:03.852211033Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763 pid=2518 runtime=io.containerd.runc.v2 Dec 13 07:32:03.853627 kubelet[2079]: W1213 07:32:03.853597 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:03.853754 kubelet[2079]: E1213 07:32:03.853728 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:03.874535 systemd[1]: Started cri-containerd-8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763.scope. Dec 13 07:32:03.928726 env[1198]: time="2024-12-13T07:32:03.924854762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8594b85855-rs28t,Uid:4430feb1-92a8-4f61-b0a7-8e966cd01734,Namespace:calico-system,Attempt:0,} returns sandbox id \"5e15aacfe7589e2d534f572897e4b8d510ad9c0a078270cefb7d3e7a5d9f8fef\"" Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.936000 audit: BPF prog-id=125 op=LOAD Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2518 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831363866313432383165383538636163383634343337363633373733 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2518 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831363866313432383165383538636163383634343337363633373733 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit: BPF prog-id=126 op=LOAD Dec 13 07:32:03.937000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021e520 items=0 ppid=2518 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831363866313432383165383538636163383634343337363633373733 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.937000 audit: BPF prog-id=127 op=LOAD Dec 13 07:32:03.937000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021e568 items=0 ppid=2518 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831363866313432383165383538636163383634343337363633373733 Dec 13 07:32:03.937000 audit: BPF prog-id=127 op=UNLOAD Dec 13 07:32:03.938000 audit: BPF prog-id=126 op=UNLOAD Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:03.938000 audit: BPF prog-id=128 op=LOAD Dec 13 07:32:03.938000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021e978 items=0 ppid=2518 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:03.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831363866313432383165383538636163383634343337363633373733 Dec 13 07:32:03.958682 env[1198]: time="2024-12-13T07:32:03.958619669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 07:32:03.976323 env[1198]: time="2024-12-13T07:32:03.976252234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w544t,Uid:477a7b2c-960a-4d10-a3e5-603fca39843f,Namespace:calico-system,Attempt:0,} returns sandbox id \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\"" Dec 13 07:32:04.154000 audit[2560]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:04.154000 audit[2560]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd2349b230 a2=0 a3=7ffd2349b21c items=0 ppid=2260 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:04.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:04.159000 audit[2560]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:04.159000 audit[2560]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd2349b230 a2=0 a3=0 items=0 ppid=2260 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:04.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:05.229806 kubelet[2079]: E1213 07:32:05.229692 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:05.390146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount165542131.mount: Deactivated successfully. Dec 13 07:32:07.230006 kubelet[2079]: E1213 07:32:07.229950 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:07.351891 env[1198]: time="2024-12-13T07:32:07.351823948Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:07.354683 env[1198]: time="2024-12-13T07:32:07.354639597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:07.357841 env[1198]: time="2024-12-13T07:32:07.357334345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:07.359252 env[1198]: time="2024-12-13T07:32:07.359150902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:07.359900 env[1198]: time="2024-12-13T07:32:07.359853341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 07:32:07.363399 env[1198]: time="2024-12-13T07:32:07.363164094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 07:32:07.391844 env[1198]: time="2024-12-13T07:32:07.391784032Z" level=info msg="CreateContainer within sandbox \"5e15aacfe7589e2d534f572897e4b8d510ad9c0a078270cefb7d3e7a5d9f8fef\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 07:32:07.413977 env[1198]: time="2024-12-13T07:32:07.413894803Z" level=info msg="CreateContainer within sandbox \"5e15aacfe7589e2d534f572897e4b8d510ad9c0a078270cefb7d3e7a5d9f8fef\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"151d203ac1e4b4d0c46dcca27ea86e404059095eb85b1578d6c0c0998a03b547\"" Dec 13 07:32:07.415005 env[1198]: time="2024-12-13T07:32:07.414949880Z" level=info msg="StartContainer for \"151d203ac1e4b4d0c46dcca27ea86e404059095eb85b1578d6c0c0998a03b547\"" Dec 13 07:32:07.449687 systemd[1]: Started cri-containerd-151d203ac1e4b4d0c46dcca27ea86e404059095eb85b1578d6c0c0998a03b547.scope. Dec 13 07:32:07.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.494967 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 07:32:07.495111 kernel: audit: type=1400 audit(1734075127.488:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.506896 kernel: audit: type=1400 audit(1734075127.488:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.512864 kernel: audit: type=1400 audit(1734075127.499:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.524053 kernel: audit: type=1400 audit(1734075127.499:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.524210 kernel: audit: type=1400 audit(1734075127.499:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.524330 kernel: audit: type=1400 audit(1734075127.499:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.543753 kernel: audit: type=1400 audit(1734075127.499:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.543892 kernel: audit: type=1400 audit(1734075127.499:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.543952 kernel: audit: type=1400 audit(1734075127.499:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.554850 kernel: audit: type=1400 audit(1734075127.499:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit: BPF prog-id=129 op=LOAD Dec 13 07:32:07.499000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2451 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:07.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135316432303361633165346234643063343664636361323765613836 Dec 13 07:32:07.499000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.499000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2451 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:07.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135316432303361633165346234643063343664636361323765613836 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit: BPF prog-id=130 op=LOAD Dec 13 07:32:07.500000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020e380 items=0 ppid=2451 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:07.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135316432303361633165346234643063343664636361323765613836 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit: BPF prog-id=131 op=LOAD Dec 13 07:32:07.500000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020e3c8 items=0 ppid=2451 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:07.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135316432303361633165346234643063343664636361323765613836 Dec 13 07:32:07.500000 audit: BPF prog-id=131 op=UNLOAD Dec 13 07:32:07.500000 audit: BPF prog-id=130 op=UNLOAD Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:07.500000 audit: BPF prog-id=132 op=LOAD Dec 13 07:32:07.500000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020e7d8 items=0 ppid=2451 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:07.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135316432303361633165346234643063343664636361323765613836 Dec 13 07:32:07.596949 env[1198]: time="2024-12-13T07:32:07.596893492Z" level=info msg="StartContainer for \"151d203ac1e4b4d0c46dcca27ea86e404059095eb85b1578d6c0c0998a03b547\" returns successfully" Dec 13 07:32:08.353457 kubelet[2079]: I1213 07:32:08.353332 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8594b85855-rs28t" podStartSLOduration=1.93827851 podStartE2EDuration="5.353205621s" podCreationTimestamp="2024-12-13 07:32:03 +0000 UTC" firstStartedPulling="2024-12-13 07:32:03.946701389 +0000 UTC m=+22.036556346" lastFinishedPulling="2024-12-13 07:32:07.361628497 +0000 UTC m=+25.451483457" observedRunningTime="2024-12-13 07:32:08.350525355 +0000 UTC m=+26.440380322" watchObservedRunningTime="2024-12-13 07:32:08.353205621 +0000 UTC m=+26.443060594" Dec 13 07:32:08.372302 systemd[1]: run-containerd-runc-k8s.io-151d203ac1e4b4d0c46dcca27ea86e404059095eb85b1578d6c0c0998a03b547-runc.hGLMLm.mount: Deactivated successfully. Dec 13 07:32:08.422666 kubelet[2079]: E1213 07:32:08.422581 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.422666 kubelet[2079]: W1213 07:32:08.422640 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.422994 kubelet[2079]: E1213 07:32:08.422723 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.423058 kubelet[2079]: E1213 07:32:08.423035 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.423058 kubelet[2079]: W1213 07:32:08.423049 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.423178 kubelet[2079]: E1213 07:32:08.423082 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.423363 kubelet[2079]: E1213 07:32:08.423340 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.423429 kubelet[2079]: W1213 07:32:08.423363 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.423429 kubelet[2079]: E1213 07:32:08.423385 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.423717 kubelet[2079]: E1213 07:32:08.423683 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.423717 kubelet[2079]: W1213 07:32:08.423714 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.423875 kubelet[2079]: E1213 07:32:08.423730 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.423995 kubelet[2079]: E1213 07:32:08.423972 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.423995 kubelet[2079]: W1213 07:32:08.423991 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.424129 kubelet[2079]: E1213 07:32:08.424007 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.424253 kubelet[2079]: E1213 07:32:08.424232 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.424253 kubelet[2079]: W1213 07:32:08.424250 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.424414 kubelet[2079]: E1213 07:32:08.424266 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.424519 kubelet[2079]: E1213 07:32:08.424497 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.424519 kubelet[2079]: W1213 07:32:08.424518 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.424669 kubelet[2079]: E1213 07:32:08.424534 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.424797 kubelet[2079]: E1213 07:32:08.424753 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.424797 kubelet[2079]: W1213 07:32:08.424787 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.424947 kubelet[2079]: E1213 07:32:08.424804 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.425045 kubelet[2079]: E1213 07:32:08.425021 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.425045 kubelet[2079]: W1213 07:32:08.425043 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.425208 kubelet[2079]: E1213 07:32:08.425058 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.425283 kubelet[2079]: E1213 07:32:08.425271 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.425336 kubelet[2079]: W1213 07:32:08.425284 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.425336 kubelet[2079]: E1213 07:32:08.425307 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.425546 kubelet[2079]: E1213 07:32:08.425526 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.425546 kubelet[2079]: W1213 07:32:08.425544 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.425665 kubelet[2079]: E1213 07:32:08.425558 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.426086 kubelet[2079]: E1213 07:32:08.425841 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.426086 kubelet[2079]: W1213 07:32:08.425859 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.426086 kubelet[2079]: E1213 07:32:08.425874 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.426287 kubelet[2079]: E1213 07:32:08.426100 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.426287 kubelet[2079]: W1213 07:32:08.426114 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.426287 kubelet[2079]: E1213 07:32:08.426127 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.426440 kubelet[2079]: E1213 07:32:08.426363 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.426440 kubelet[2079]: W1213 07:32:08.426376 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.426440 kubelet[2079]: E1213 07:32:08.426390 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.426699 kubelet[2079]: E1213 07:32:08.426597 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.426699 kubelet[2079]: W1213 07:32:08.426610 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.426699 kubelet[2079]: E1213 07:32:08.426623 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.427696 kubelet[2079]: E1213 07:32:08.427118 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.427696 kubelet[2079]: W1213 07:32:08.427138 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.427696 kubelet[2079]: E1213 07:32:08.427162 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.427696 kubelet[2079]: E1213 07:32:08.427428 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.427696 kubelet[2079]: W1213 07:32:08.427441 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.427696 kubelet[2079]: E1213 07:32:08.427508 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.429629 kubelet[2079]: E1213 07:32:08.429593 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.429629 kubelet[2079]: W1213 07:32:08.429626 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.429651 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.429986 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.430605 kubelet[2079]: W1213 07:32:08.430001 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.430016 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.430259 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.430605 kubelet[2079]: W1213 07:32:08.430273 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.430287 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.430490 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.430605 kubelet[2079]: W1213 07:32:08.430504 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.430605 kubelet[2079]: E1213 07:32:08.430522 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.431643 kubelet[2079]: E1213 07:32:08.430872 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.431643 kubelet[2079]: W1213 07:32:08.430886 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.431643 kubelet[2079]: E1213 07:32:08.430900 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.433502 kubelet[2079]: E1213 07:32:08.433324 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.433502 kubelet[2079]: W1213 07:32:08.433369 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.433502 kubelet[2079]: E1213 07:32:08.433396 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.434739 kubelet[2079]: E1213 07:32:08.434543 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.434739 kubelet[2079]: W1213 07:32:08.434561 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.434959 kubelet[2079]: E1213 07:32:08.434935 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.435167 kubelet[2079]: E1213 07:32:08.435137 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.435394 kubelet[2079]: W1213 07:32:08.435335 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.435648 kubelet[2079]: E1213 07:32:08.435598 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.436067 kubelet[2079]: E1213 07:32:08.436024 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.436214 kubelet[2079]: W1213 07:32:08.436191 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.436477 kubelet[2079]: E1213 07:32:08.436427 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.437370 kubelet[2079]: E1213 07:32:08.437321 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.437559 kubelet[2079]: W1213 07:32:08.437533 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.438120 kubelet[2079]: E1213 07:32:08.438083 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.438536 kubelet[2079]: E1213 07:32:08.438515 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.438668 kubelet[2079]: W1213 07:32:08.438643 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.438923 kubelet[2079]: E1213 07:32:08.438851 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.439592 kubelet[2079]: E1213 07:32:08.439571 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.439933 kubelet[2079]: W1213 07:32:08.439908 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.440110 kubelet[2079]: E1213 07:32:08.440078 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.440532 kubelet[2079]: E1213 07:32:08.440501 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.440532 kubelet[2079]: W1213 07:32:08.440525 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.440662 kubelet[2079]: E1213 07:32:08.440543 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.441058 kubelet[2079]: E1213 07:32:08.441028 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.441058 kubelet[2079]: W1213 07:32:08.441050 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.441275 kubelet[2079]: E1213 07:32:08.441066 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.441594 kubelet[2079]: E1213 07:32:08.441566 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.441594 kubelet[2079]: W1213 07:32:08.441589 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.441721 kubelet[2079]: E1213 07:32:08.441606 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:08.442786 kubelet[2079]: E1213 07:32:08.442748 2079 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 07:32:08.442881 kubelet[2079]: W1213 07:32:08.442817 2079 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 07:32:08.442881 kubelet[2079]: E1213 07:32:08.442840 2079 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 07:32:09.024746 env[1198]: time="2024-12-13T07:32:09.024601494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:09.026967 env[1198]: time="2024-12-13T07:32:09.026911368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:09.029299 env[1198]: time="2024-12-13T07:32:09.029261787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:09.032530 env[1198]: time="2024-12-13T07:32:09.032482587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 07:32:09.032821 env[1198]: time="2024-12-13T07:32:09.031388028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:09.037428 env[1198]: time="2024-12-13T07:32:09.037342673Z" level=info msg="CreateContainer within sandbox \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 07:32:09.054139 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1985211677.mount: Deactivated successfully. Dec 13 07:32:09.059309 env[1198]: time="2024-12-13T07:32:09.059260274Z" level=info msg="CreateContainer within sandbox \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f\"" Dec 13 07:32:09.061078 env[1198]: time="2024-12-13T07:32:09.060931864Z" level=info msg="StartContainer for \"cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f\"" Dec 13 07:32:09.091070 systemd[1]: Started cri-containerd-cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f.scope. Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3c9a2640a8 items=0 ppid=2518 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:09.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366623461353966643166663566613032613231636535356237336361 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit: BPF prog-id=133 op=LOAD Dec 13 07:32:09.129000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f94a8 items=0 ppid=2518 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:09.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366623461353966643166663566613032613231636535356237336361 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit: BPF prog-id=134 op=LOAD Dec 13 07:32:09.129000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f94f8 items=0 ppid=2518 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:09.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366623461353966643166663566613032613231636535356237336361 Dec 13 07:32:09.129000 audit: BPF prog-id=134 op=UNLOAD Dec 13 07:32:09.129000 audit: BPF prog-id=133 op=UNLOAD Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:09.129000 audit: BPF prog-id=135 op=LOAD Dec 13 07:32:09.129000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9588 items=0 ppid=2518 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:09.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366623461353966643166663566613032613231636535356237336361 Dec 13 07:32:09.149760 env[1198]: time="2024-12-13T07:32:09.149706257Z" level=info msg="StartContainer for \"cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f\" returns successfully" Dec 13 07:32:09.166457 systemd[1]: cri-containerd-cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f.scope: Deactivated successfully. Dec 13 07:32:09.170000 audit: BPF prog-id=135 op=UNLOAD Dec 13 07:32:09.229565 kubelet[2079]: E1213 07:32:09.229129 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:09.338982 kubelet[2079]: I1213 07:32:09.338851 2079 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 07:32:09.372184 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f-rootfs.mount: Deactivated successfully. Dec 13 07:32:09.495015 env[1198]: time="2024-12-13T07:32:09.494945262Z" level=info msg="shim disconnected" id=cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f Dec 13 07:32:09.495547 env[1198]: time="2024-12-13T07:32:09.495515175Z" level=warning msg="cleaning up after shim disconnected" id=cfb4a59fd1ff5fa02a21ce55b73ca5b2f6862ea95ea20278bd1e6b7ad44a590f namespace=k8s.io Dec 13 07:32:09.495747 env[1198]: time="2024-12-13T07:32:09.495720698Z" level=info msg="cleaning up dead shim" Dec 13 07:32:09.509739 env[1198]: time="2024-12-13T07:32:09.509681244Z" level=warning msg="cleanup warnings time=\"2024-12-13T07:32:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2680 runtime=io.containerd.runc.v2\n" Dec 13 07:32:10.344573 env[1198]: time="2024-12-13T07:32:10.344519288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 07:32:11.229386 kubelet[2079]: E1213 07:32:11.229314 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:13.230066 kubelet[2079]: E1213 07:32:13.229355 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:14.720427 kubelet[2079]: I1213 07:32:14.719939 2079 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 07:32:14.814670 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 07:32:14.814959 kernel: audit: type=1325 audit(1734075134.805:982): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:14.805000 audit[2696]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:14.805000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe69eddaf0 a2=0 a3=7ffe69eddadc items=0 ppid=2260 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:14.825801 kernel: audit: type=1300 audit(1734075134.805:982): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe69eddaf0 a2=0 a3=7ffe69eddadc items=0 ppid=2260 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:14.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:14.834397 kernel: audit: type=1327 audit(1734075134.805:982): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:14.834489 kernel: audit: type=1325 audit(1734075134.825:983): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:14.825000 audit[2696]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:14.825000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe69eddaf0 a2=0 a3=7ffe69eddadc items=0 ppid=2260 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:14.847006 kernel: audit: type=1300 audit(1734075134.825:983): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe69eddaf0 a2=0 a3=7ffe69eddadc items=0 ppid=2260 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:14.847105 kernel: audit: type=1327 audit(1734075134.825:983): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:14.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:15.229798 kubelet[2079]: E1213 07:32:15.229677 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:17.229259 kubelet[2079]: E1213 07:32:17.229172 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:17.674691 env[1198]: time="2024-12-13T07:32:17.674629226Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:17.677435 env[1198]: time="2024-12-13T07:32:17.677398504Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:17.680132 env[1198]: time="2024-12-13T07:32:17.680099640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:17.682682 env[1198]: time="2024-12-13T07:32:17.682648753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:17.683757 env[1198]: time="2024-12-13T07:32:17.683711581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 07:32:17.689309 env[1198]: time="2024-12-13T07:32:17.689268404Z" level=info msg="CreateContainer within sandbox \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 07:32:17.708205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3072643270.mount: Deactivated successfully. Dec 13 07:32:17.713938 env[1198]: time="2024-12-13T07:32:17.713874783Z" level=info msg="CreateContainer within sandbox \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3\"" Dec 13 07:32:17.716104 env[1198]: time="2024-12-13T07:32:17.714888541Z" level=info msg="StartContainer for \"77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3\"" Dec 13 07:32:17.751455 systemd[1]: Started cri-containerd-77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3.scope. Dec 13 07:32:17.794949 kernel: audit: type=1400 audit(1734075137.786:984): avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.786000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.786000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fde774e52d8 items=0 ppid=2518 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:17.803814 kernel: audit: type=1300 audit(1734075137.786:984): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fde774e52d8 items=0 ppid=2518 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:17.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633438346234323732653532653764326635633935333164663437 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.815267 kernel: audit: type=1327 audit(1734075137.786:984): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633438346234323732653532653764326635633935333164663437 Dec 13 07:32:17.815393 kernel: audit: type=1400 audit(1734075137.788:985): avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.788000 audit: BPF prog-id=136 op=LOAD Dec 13 07:32:17.788000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003986c8 items=0 ppid=2518 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:17.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633438346234323732653532653764326635633935333164663437 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit: BPF prog-id=137 op=LOAD Dec 13 07:32:17.794000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000398718 items=0 ppid=2518 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:17.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633438346234323732653532653764326635633935333164663437 Dec 13 07:32:17.794000 audit: BPF prog-id=137 op=UNLOAD Dec 13 07:32:17.794000 audit: BPF prog-id=136 op=UNLOAD Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:17.794000 audit: BPF prog-id=138 op=LOAD Dec 13 07:32:17.794000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003987a8 items=0 ppid=2518 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:17.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633438346234323732653532653764326635633935333164663437 Dec 13 07:32:17.835482 env[1198]: time="2024-12-13T07:32:17.835388429Z" level=info msg="StartContainer for \"77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3\" returns successfully" Dec 13 07:32:18.703864 systemd[1]: run-containerd-runc-k8s.io-77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3-runc.OI0paE.mount: Deactivated successfully. Dec 13 07:32:18.888316 env[1198]: time="2024-12-13T07:32:18.888235841Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 07:32:18.894458 systemd[1]: cri-containerd-77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3.scope: Deactivated successfully. Dec 13 07:32:18.897000 audit: BPF prog-id=138 op=UNLOAD Dec 13 07:32:18.924664 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3-rootfs.mount: Deactivated successfully. Dec 13 07:32:18.933040 env[1198]: time="2024-12-13T07:32:18.932952377Z" level=info msg="shim disconnected" id=77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3 Dec 13 07:32:18.933040 env[1198]: time="2024-12-13T07:32:18.933014209Z" level=warning msg="cleaning up after shim disconnected" id=77c484b4272e52e7d2f5c9531df47c6c949e13bad58b4a819dd6859c21303de3 namespace=k8s.io Dec 13 07:32:18.933040 env[1198]: time="2024-12-13T07:32:18.933030277Z" level=info msg="cleaning up dead shim" Dec 13 07:32:18.946037 env[1198]: time="2024-12-13T07:32:18.944851194Z" level=warning msg="cleanup warnings time=\"2024-12-13T07:32:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2744 runtime=io.containerd.runc.v2\n" Dec 13 07:32:18.956574 kubelet[2079]: I1213 07:32:18.955265 2079 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 07:32:19.006566 kubelet[2079]: I1213 07:32:19.006468 2079 topology_manager.go:215] "Topology Admit Handler" podUID="0e75987e-db11-4ff0-9145-fdc18a5e98e0" podNamespace="kube-system" podName="coredns-7db6d8ff4d-4rm8p" Dec 13 07:32:19.014202 kubelet[2079]: I1213 07:32:19.014156 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8rhpn\" (UniqueName: \"kubernetes.io/projected/0e75987e-db11-4ff0-9145-fdc18a5e98e0-kube-api-access-8rhpn\") pod \"coredns-7db6d8ff4d-4rm8p\" (UID: \"0e75987e-db11-4ff0-9145-fdc18a5e98e0\") " pod="kube-system/coredns-7db6d8ff4d-4rm8p" Dec 13 07:32:19.014454 kubelet[2079]: I1213 07:32:19.014417 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0e75987e-db11-4ff0-9145-fdc18a5e98e0-config-volume\") pod \"coredns-7db6d8ff4d-4rm8p\" (UID: \"0e75987e-db11-4ff0-9145-fdc18a5e98e0\") " pod="kube-system/coredns-7db6d8ff4d-4rm8p" Dec 13 07:32:19.019066 systemd[1]: Created slice kubepods-burstable-pod0e75987e_db11_4ff0_9145_fdc18a5e98e0.slice. Dec 13 07:32:19.028899 kubelet[2079]: I1213 07:32:19.028843 2079 topology_manager.go:215] "Topology Admit Handler" podUID="032a4e98-b393-40cf-814f-27eb5e70c7cb" podNamespace="calico-apiserver" podName="calico-apiserver-5578c47b89-qftcv" Dec 13 07:32:19.029318 kubelet[2079]: I1213 07:32:19.029289 2079 topology_manager.go:215] "Topology Admit Handler" podUID="5fc826e7-bbe0-48ce-8c53-3b2740eaea10" podNamespace="calico-apiserver" podName="calico-apiserver-5578c47b89-7z6q5" Dec 13 07:32:19.029603 kubelet[2079]: I1213 07:32:19.029575 2079 topology_manager.go:215] "Topology Admit Handler" podUID="bfb2182b-964d-4b8e-bb23-da5eae62ebaf" podNamespace="calico-system" podName="calico-kube-controllers-7d86d7ddd6-xn2hh" Dec 13 07:32:19.032866 kubelet[2079]: I1213 07:32:19.032837 2079 topology_manager.go:215] "Topology Admit Handler" podUID="9516a2ff-3e68-4f87-82e0-4c53ce709c36" podNamespace="kube-system" podName="coredns-7db6d8ff4d-b2m79" Dec 13 07:32:19.037330 kubelet[2079]: W1213 07:32:19.037293 2079 reflector.go:547] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:srv-9sek4.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-9sek4.gb1.brightbox.com' and this object Dec 13 07:32:19.037468 kubelet[2079]: E1213 07:32:19.037371 2079 reflector.go:150] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:srv-9sek4.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-9sek4.gb1.brightbox.com' and this object Dec 13 07:32:19.042519 systemd[1]: Created slice kubepods-besteffort-podbfb2182b_964d_4b8e_bb23_da5eae62ebaf.slice. Dec 13 07:32:19.052227 systemd[1]: Created slice kubepods-besteffort-pod032a4e98_b393_40cf_814f_27eb5e70c7cb.slice. Dec 13 07:32:19.062383 systemd[1]: Created slice kubepods-besteffort-pod5fc826e7_bbe0_48ce_8c53_3b2740eaea10.slice. Dec 13 07:32:19.071604 systemd[1]: Created slice kubepods-burstable-pod9516a2ff_3e68_4f87_82e0_4c53ce709c36.slice. Dec 13 07:32:19.114993 kubelet[2079]: I1213 07:32:19.114944 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bfb2182b-964d-4b8e-bb23-da5eae62ebaf-tigera-ca-bundle\") pod \"calico-kube-controllers-7d86d7ddd6-xn2hh\" (UID: \"bfb2182b-964d-4b8e-bb23-da5eae62ebaf\") " pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" Dec 13 07:32:19.115251 kubelet[2079]: I1213 07:32:19.115002 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nwgwb\" (UniqueName: \"kubernetes.io/projected/bfb2182b-964d-4b8e-bb23-da5eae62ebaf-kube-api-access-nwgwb\") pod \"calico-kube-controllers-7d86d7ddd6-xn2hh\" (UID: \"bfb2182b-964d-4b8e-bb23-da5eae62ebaf\") " pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" Dec 13 07:32:19.115251 kubelet[2079]: I1213 07:32:19.115046 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5fc826e7-bbe0-48ce-8c53-3b2740eaea10-calico-apiserver-certs\") pod \"calico-apiserver-5578c47b89-7z6q5\" (UID: \"5fc826e7-bbe0-48ce-8c53-3b2740eaea10\") " pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" Dec 13 07:32:19.115251 kubelet[2079]: I1213 07:32:19.115085 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8vzcz\" (UniqueName: \"kubernetes.io/projected/5fc826e7-bbe0-48ce-8c53-3b2740eaea10-kube-api-access-8vzcz\") pod \"calico-apiserver-5578c47b89-7z6q5\" (UID: \"5fc826e7-bbe0-48ce-8c53-3b2740eaea10\") " pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" Dec 13 07:32:19.115251 kubelet[2079]: I1213 07:32:19.115164 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nhrgt\" (UniqueName: \"kubernetes.io/projected/9516a2ff-3e68-4f87-82e0-4c53ce709c36-kube-api-access-nhrgt\") pod \"coredns-7db6d8ff4d-b2m79\" (UID: \"9516a2ff-3e68-4f87-82e0-4c53ce709c36\") " pod="kube-system/coredns-7db6d8ff4d-b2m79" Dec 13 07:32:19.115514 kubelet[2079]: I1213 07:32:19.115270 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/032a4e98-b393-40cf-814f-27eb5e70c7cb-calico-apiserver-certs\") pod \"calico-apiserver-5578c47b89-qftcv\" (UID: \"032a4e98-b393-40cf-814f-27eb5e70c7cb\") " pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" Dec 13 07:32:19.115514 kubelet[2079]: I1213 07:32:19.115395 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9516a2ff-3e68-4f87-82e0-4c53ce709c36-config-volume\") pod \"coredns-7db6d8ff4d-b2m79\" (UID: \"9516a2ff-3e68-4f87-82e0-4c53ce709c36\") " pod="kube-system/coredns-7db6d8ff4d-b2m79" Dec 13 07:32:19.115514 kubelet[2079]: I1213 07:32:19.115432 2079 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pvxdr\" (UniqueName: \"kubernetes.io/projected/032a4e98-b393-40cf-814f-27eb5e70c7cb-kube-api-access-pvxdr\") pod \"calico-apiserver-5578c47b89-qftcv\" (UID: \"032a4e98-b393-40cf-814f-27eb5e70c7cb\") " pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" Dec 13 07:32:19.250603 systemd[1]: Created slice kubepods-besteffort-podafff8102_04e9_47a8_bb52_63e679231697.slice. Dec 13 07:32:19.257131 env[1198]: time="2024-12-13T07:32:19.257076049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ljtmb,Uid:afff8102-04e9-47a8-bb52-63e679231697,Namespace:calico-system,Attempt:0,}" Dec 13 07:32:19.350971 env[1198]: time="2024-12-13T07:32:19.350901502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d86d7ddd6-xn2hh,Uid:bfb2182b-964d-4b8e-bb23-da5eae62ebaf,Namespace:calico-system,Attempt:0,}" Dec 13 07:32:19.357866 env[1198]: time="2024-12-13T07:32:19.357820020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-qftcv,Uid:032a4e98-b393-40cf-814f-27eb5e70c7cb,Namespace:calico-apiserver,Attempt:0,}" Dec 13 07:32:19.387993 env[1198]: time="2024-12-13T07:32:19.387927025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-7z6q5,Uid:5fc826e7-bbe0-48ce-8c53-3b2740eaea10,Namespace:calico-apiserver,Attempt:0,}" Dec 13 07:32:19.398368 env[1198]: time="2024-12-13T07:32:19.398284956Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 07:32:19.524860 env[1198]: time="2024-12-13T07:32:19.524159951Z" level=error msg="Failed to destroy network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.525340 env[1198]: time="2024-12-13T07:32:19.525291267Z" level=error msg="encountered an error cleaning up failed sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.525557 env[1198]: time="2024-12-13T07:32:19.525379143Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ljtmb,Uid:afff8102-04e9-47a8-bb52-63e679231697,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.527308 kubelet[2079]: E1213 07:32:19.525898 2079 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.527431 kubelet[2079]: E1213 07:32:19.527391 2079 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:19.527523 kubelet[2079]: E1213 07:32:19.527437 2079 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ljtmb" Dec 13 07:32:19.527587 kubelet[2079]: E1213 07:32:19.527538 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ljtmb_calico-system(afff8102-04e9-47a8-bb52-63e679231697)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ljtmb_calico-system(afff8102-04e9-47a8-bb52-63e679231697)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:19.562029 env[1198]: time="2024-12-13T07:32:19.561954797Z" level=error msg="Failed to destroy network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.562732 env[1198]: time="2024-12-13T07:32:19.562688637Z" level=error msg="encountered an error cleaning up failed sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.562989 env[1198]: time="2024-12-13T07:32:19.562942584Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d86d7ddd6-xn2hh,Uid:bfb2182b-964d-4b8e-bb23-da5eae62ebaf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.563458 kubelet[2079]: E1213 07:32:19.563395 2079 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.563565 kubelet[2079]: E1213 07:32:19.563482 2079 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" Dec 13 07:32:19.563565 kubelet[2079]: E1213 07:32:19.563525 2079 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" Dec 13 07:32:19.563702 kubelet[2079]: E1213 07:32:19.563583 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7d86d7ddd6-xn2hh_calico-system(bfb2182b-964d-4b8e-bb23-da5eae62ebaf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7d86d7ddd6-xn2hh_calico-system(bfb2182b-964d-4b8e-bb23-da5eae62ebaf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" podUID="bfb2182b-964d-4b8e-bb23-da5eae62ebaf" Dec 13 07:32:19.590426 env[1198]: time="2024-12-13T07:32:19.590334456Z" level=error msg="Failed to destroy network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.591094 env[1198]: time="2024-12-13T07:32:19.591005787Z" level=error msg="encountered an error cleaning up failed sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.591212 env[1198]: time="2024-12-13T07:32:19.591116790Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-qftcv,Uid:032a4e98-b393-40cf-814f-27eb5e70c7cb,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.591595 kubelet[2079]: E1213 07:32:19.591544 2079 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.591701 kubelet[2079]: E1213 07:32:19.591620 2079 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" Dec 13 07:32:19.591701 kubelet[2079]: E1213 07:32:19.591661 2079 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" Dec 13 07:32:19.591868 kubelet[2079]: E1213 07:32:19.591733 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5578c47b89-qftcv_calico-apiserver(032a4e98-b393-40cf-814f-27eb5e70c7cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5578c47b89-qftcv_calico-apiserver(032a4e98-b393-40cf-814f-27eb5e70c7cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" podUID="032a4e98-b393-40cf-814f-27eb5e70c7cb" Dec 13 07:32:19.600589 env[1198]: time="2024-12-13T07:32:19.600528975Z" level=error msg="Failed to destroy network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.601197 env[1198]: time="2024-12-13T07:32:19.601154825Z" level=error msg="encountered an error cleaning up failed sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.601407 env[1198]: time="2024-12-13T07:32:19.601353036Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-7z6q5,Uid:5fc826e7-bbe0-48ce-8c53-3b2740eaea10,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.602159 kubelet[2079]: E1213 07:32:19.601757 2079 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:19.602159 kubelet[2079]: E1213 07:32:19.601832 2079 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" Dec 13 07:32:19.602159 kubelet[2079]: E1213 07:32:19.601860 2079 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" Dec 13 07:32:19.602385 kubelet[2079]: E1213 07:32:19.601918 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5578c47b89-7z6q5_calico-apiserver(5fc826e7-bbe0-48ce-8c53-3b2740eaea10)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5578c47b89-7z6q5_calico-apiserver(5fc826e7-bbe0-48ce-8c53-3b2740eaea10)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" podUID="5fc826e7-bbe0-48ce-8c53-3b2740eaea10" Dec 13 07:32:20.116821 kubelet[2079]: E1213 07:32:20.116532 2079 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 07:32:20.119688 kubelet[2079]: E1213 07:32:20.119651 2079 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/0e75987e-db11-4ff0-9145-fdc18a5e98e0-config-volume podName:0e75987e-db11-4ff0-9145-fdc18a5e98e0 nodeName:}" failed. No retries permitted until 2024-12-13 07:32:20.616717541 +0000 UTC m=+38.706572501 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/0e75987e-db11-4ff0-9145-fdc18a5e98e0-config-volume") pod "coredns-7db6d8ff4d-4rm8p" (UID: "0e75987e-db11-4ff0-9145-fdc18a5e98e0") : failed to sync configmap cache: timed out waiting for the condition Dec 13 07:32:20.221811 kubelet[2079]: E1213 07:32:20.221739 2079 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 07:32:20.222165 kubelet[2079]: E1213 07:32:20.222141 2079 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/9516a2ff-3e68-4f87-82e0-4c53ce709c36-config-volume podName:9516a2ff-3e68-4f87-82e0-4c53ce709c36 nodeName:}" failed. No retries permitted until 2024-12-13 07:32:20.722117263 +0000 UTC m=+38.811972217 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/9516a2ff-3e68-4f87-82e0-4c53ce709c36-config-volume") pod "coredns-7db6d8ff4d-b2m79" (UID: "9516a2ff-3e68-4f87-82e0-4c53ce709c36") : failed to sync configmap cache: timed out waiting for the condition Dec 13 07:32:20.397179 kubelet[2079]: I1213 07:32:20.396307 2079 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:20.402662 kubelet[2079]: I1213 07:32:20.402480 2079 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:20.406006 env[1198]: time="2024-12-13T07:32:20.404315550Z" level=info msg="StopPodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\"" Dec 13 07:32:20.406006 env[1198]: time="2024-12-13T07:32:20.405544768Z" level=info msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" Dec 13 07:32:20.407916 kubelet[2079]: I1213 07:32:20.407876 2079 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:20.408547 env[1198]: time="2024-12-13T07:32:20.408489312Z" level=info msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" Dec 13 07:32:20.410102 kubelet[2079]: I1213 07:32:20.410063 2079 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:20.410609 env[1198]: time="2024-12-13T07:32:20.410573610Z" level=info msg="StopPodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\"" Dec 13 07:32:20.468876 env[1198]: time="2024-12-13T07:32:20.468750140Z" level=error msg="StopPodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" failed" error="failed to destroy network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:20.469569 kubelet[2079]: E1213 07:32:20.469498 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:20.469682 kubelet[2079]: E1213 07:32:20.469607 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8"} Dec 13 07:32:20.470146 kubelet[2079]: E1213 07:32:20.469697 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"032a4e98-b393-40cf-814f-27eb5e70c7cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:20.470146 kubelet[2079]: E1213 07:32:20.469733 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"032a4e98-b393-40cf-814f-27eb5e70c7cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" podUID="032a4e98-b393-40cf-814f-27eb5e70c7cb" Dec 13 07:32:20.484088 env[1198]: time="2024-12-13T07:32:20.484014643Z" level=error msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" failed" error="failed to destroy network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:20.485215 kubelet[2079]: E1213 07:32:20.484921 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:20.485215 kubelet[2079]: E1213 07:32:20.484992 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e"} Dec 13 07:32:20.485215 kubelet[2079]: E1213 07:32:20.485039 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bfb2182b-964d-4b8e-bb23-da5eae62ebaf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:20.485215 kubelet[2079]: E1213 07:32:20.485069 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bfb2182b-964d-4b8e-bb23-da5eae62ebaf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" podUID="bfb2182b-964d-4b8e-bb23-da5eae62ebaf" Dec 13 07:32:20.516368 env[1198]: time="2024-12-13T07:32:20.516293550Z" level=error msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" failed" error="failed to destroy network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:20.516998 kubelet[2079]: E1213 07:32:20.516905 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:20.517124 kubelet[2079]: E1213 07:32:20.517051 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657"} Dec 13 07:32:20.517183 kubelet[2079]: E1213 07:32:20.517135 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"afff8102-04e9-47a8-bb52-63e679231697\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:20.517387 kubelet[2079]: E1213 07:32:20.517178 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"afff8102-04e9-47a8-bb52-63e679231697\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:20.526110 env[1198]: time="2024-12-13T07:32:20.526045925Z" level=error msg="StopPodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" failed" error="failed to destroy network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:20.526761 kubelet[2079]: E1213 07:32:20.526698 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:20.526881 kubelet[2079]: E1213 07:32:20.526761 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8"} Dec 13 07:32:20.526881 kubelet[2079]: E1213 07:32:20.526830 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5fc826e7-bbe0-48ce-8c53-3b2740eaea10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:20.526881 kubelet[2079]: E1213 07:32:20.526860 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5fc826e7-bbe0-48ce-8c53-3b2740eaea10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" podUID="5fc826e7-bbe0-48ce-8c53-3b2740eaea10" Dec 13 07:32:20.838650 env[1198]: time="2024-12-13T07:32:20.838584775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rm8p,Uid:0e75987e-db11-4ff0-9145-fdc18a5e98e0,Namespace:kube-system,Attempt:0,}" Dec 13 07:32:20.877187 env[1198]: time="2024-12-13T07:32:20.877135393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-b2m79,Uid:9516a2ff-3e68-4f87-82e0-4c53ce709c36,Namespace:kube-system,Attempt:0,}" Dec 13 07:32:21.016462 env[1198]: time="2024-12-13T07:32:21.016377389Z" level=error msg="Failed to destroy network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.017388 env[1198]: time="2024-12-13T07:32:21.017334262Z" level=error msg="encountered an error cleaning up failed sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.017613 env[1198]: time="2024-12-13T07:32:21.017553520Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rm8p,Uid:0e75987e-db11-4ff0-9145-fdc18a5e98e0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.020587 kubelet[2079]: E1213 07:32:21.018061 2079 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.020587 kubelet[2079]: E1213 07:32:21.018243 2079 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4rm8p" Dec 13 07:32:21.020587 kubelet[2079]: E1213 07:32:21.018332 2079 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4rm8p" Dec 13 07:32:21.019828 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a-shm.mount: Deactivated successfully. Dec 13 07:32:21.021742 kubelet[2079]: E1213 07:32:21.018439 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-4rm8p_kube-system(0e75987e-db11-4ff0-9145-fdc18a5e98e0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-4rm8p_kube-system(0e75987e-db11-4ff0-9145-fdc18a5e98e0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4rm8p" podUID="0e75987e-db11-4ff0-9145-fdc18a5e98e0" Dec 13 07:32:21.032009 env[1198]: time="2024-12-13T07:32:21.031940377Z" level=error msg="Failed to destroy network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.032752 env[1198]: time="2024-12-13T07:32:21.032709240Z" level=error msg="encountered an error cleaning up failed sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.032985 env[1198]: time="2024-12-13T07:32:21.032932267Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-b2m79,Uid:9516a2ff-3e68-4f87-82e0-4c53ce709c36,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.033809 kubelet[2079]: E1213 07:32:21.033671 2079 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.036123 kubelet[2079]: E1213 07:32:21.033757 2079 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-b2m79" Dec 13 07:32:21.036123 kubelet[2079]: E1213 07:32:21.033975 2079 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-b2m79" Dec 13 07:32:21.036123 kubelet[2079]: E1213 07:32:21.034081 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-b2m79_kube-system(9516a2ff-3e68-4f87-82e0-4c53ce709c36)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-b2m79_kube-system(9516a2ff-3e68-4f87-82e0-4c53ce709c36)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-b2m79" podUID="9516a2ff-3e68-4f87-82e0-4c53ce709c36" Dec 13 07:32:21.035352 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b-shm.mount: Deactivated successfully. Dec 13 07:32:21.418594 kubelet[2079]: I1213 07:32:21.415584 2079 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:21.419159 env[1198]: time="2024-12-13T07:32:21.418713127Z" level=info msg="StopPodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\"" Dec 13 07:32:21.425658 kubelet[2079]: I1213 07:32:21.424904 2079 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:21.427480 env[1198]: time="2024-12-13T07:32:21.426134048Z" level=info msg="StopPodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\"" Dec 13 07:32:21.489339 env[1198]: time="2024-12-13T07:32:21.489216901Z" level=error msg="StopPodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" failed" error="failed to destroy network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.490330 kubelet[2079]: E1213 07:32:21.489893 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:21.490330 kubelet[2079]: E1213 07:32:21.489982 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a"} Dec 13 07:32:21.490330 kubelet[2079]: E1213 07:32:21.490149 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0e75987e-db11-4ff0-9145-fdc18a5e98e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:21.490330 kubelet[2079]: E1213 07:32:21.490217 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0e75987e-db11-4ff0-9145-fdc18a5e98e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4rm8p" podUID="0e75987e-db11-4ff0-9145-fdc18a5e98e0" Dec 13 07:32:21.515008 env[1198]: time="2024-12-13T07:32:21.514898151Z" level=error msg="StopPodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" failed" error="failed to destroy network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:21.515823 kubelet[2079]: E1213 07:32:21.515532 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:21.515823 kubelet[2079]: E1213 07:32:21.515633 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b"} Dec 13 07:32:21.515823 kubelet[2079]: E1213 07:32:21.515704 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9516a2ff-3e68-4f87-82e0-4c53ce709c36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:21.515823 kubelet[2079]: E1213 07:32:21.515751 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9516a2ff-3e68-4f87-82e0-4c53ce709c36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-b2m79" podUID="9516a2ff-3e68-4f87-82e0-4c53ce709c36" Dec 13 07:32:30.701517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4291093674.mount: Deactivated successfully. Dec 13 07:32:30.762233 env[1198]: time="2024-12-13T07:32:30.762151964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:30.765142 env[1198]: time="2024-12-13T07:32:30.765103892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:30.767132 env[1198]: time="2024-12-13T07:32:30.767101296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:30.769255 env[1198]: time="2024-12-13T07:32:30.769222552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:30.771072 env[1198]: time="2024-12-13T07:32:30.771033150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 07:32:30.805373 env[1198]: time="2024-12-13T07:32:30.805317646Z" level=info msg="CreateContainer within sandbox \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 07:32:30.992398 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3719788022.mount: Deactivated successfully. Dec 13 07:32:30.998143 env[1198]: time="2024-12-13T07:32:30.998069125Z" level=info msg="CreateContainer within sandbox \"8168f14281e858cac864437663773c79a1f20cd9b98a085cad82fe0e9a5c1763\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac\"" Dec 13 07:32:31.001004 env[1198]: time="2024-12-13T07:32:31.000204978Z" level=info msg="StartContainer for \"89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac\"" Dec 13 07:32:31.030020 systemd[1]: Started cri-containerd-89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac.scope. Dec 13 07:32:31.086211 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 07:32:31.086555 kernel: audit: type=1400 audit(1734075151.076:991): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.101999 kernel: audit: type=1300 audit(1734075151.076:991): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f980a1852f8 items=0 ppid=2518 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:31.102116 kernel: audit: type=1327 audit(1734075151.076:991): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623533303133323364333333343963383766346664626334663639 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f980a1852f8 items=0 ppid=2518 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:31.112958 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.113029 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623533303133323364333333343963383766346664626334663639 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.117928 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.128008 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.133862 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.145169 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.145247 kernel: audit: type=1400 audit(1734075151.076:992): avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.076000 audit: BPF prog-id=139 op=LOAD Dec 13 07:32:31.076000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000024548 items=0 ppid=2518 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:31.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623533303133323364333333343963383766346664626334663639 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.079000 audit: BPF prog-id=140 op=LOAD Dec 13 07:32:31.079000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000024598 items=0 ppid=2518 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:31.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623533303133323364333333343963383766346664626334663639 Dec 13 07:32:31.084000 audit: BPF prog-id=140 op=UNLOAD Dec 13 07:32:31.084000 audit: BPF prog-id=139 op=UNLOAD Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:31.084000 audit: BPF prog-id=141 op=LOAD Dec 13 07:32:31.084000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000024628 items=0 ppid=2518 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:31.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623533303133323364333333343963383766346664626334663639 Dec 13 07:32:31.149145 env[1198]: time="2024-12-13T07:32:31.145840215Z" level=info msg="StartContainer for \"89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac\" returns successfully" Dec 13 07:32:31.233184 env[1198]: time="2024-12-13T07:32:31.233061760Z" level=info msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" Dec 13 07:32:31.234352 env[1198]: time="2024-12-13T07:32:31.233720582Z" level=info msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" Dec 13 07:32:31.294244 env[1198]: time="2024-12-13T07:32:31.294058703Z" level=error msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" failed" error="failed to destroy network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:31.298663 kubelet[2079]: E1213 07:32:31.298554 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:31.299620 kubelet[2079]: E1213 07:32:31.298656 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657"} Dec 13 07:32:31.299620 kubelet[2079]: E1213 07:32:31.298725 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"afff8102-04e9-47a8-bb52-63e679231697\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:31.299620 kubelet[2079]: E1213 07:32:31.298784 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"afff8102-04e9-47a8-bb52-63e679231697\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ljtmb" podUID="afff8102-04e9-47a8-bb52-63e679231697" Dec 13 07:32:31.306751 env[1198]: time="2024-12-13T07:32:31.306664127Z" level=error msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" failed" error="failed to destroy network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 07:32:31.307460 kubelet[2079]: E1213 07:32:31.307380 2079 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:31.307552 kubelet[2079]: E1213 07:32:31.307488 2079 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e"} Dec 13 07:32:31.307552 kubelet[2079]: E1213 07:32:31.307534 2079 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bfb2182b-964d-4b8e-bb23-da5eae62ebaf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 07:32:31.308429 kubelet[2079]: E1213 07:32:31.307582 2079 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bfb2182b-964d-4b8e-bb23-da5eae62ebaf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" podUID="bfb2182b-964d-4b8e-bb23-da5eae62ebaf" Dec 13 07:32:31.496993 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 07:32:31.497256 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 07:32:32.486445 systemd[1]: run-containerd-runc-k8s.io-89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac-runc.XTUP21.mount: Deactivated successfully. Dec 13 07:32:33.105000 audit[3253]: AVC avc: denied { write } for pid=3253 comm="tee" name="fd" dev="proc" ino=29862 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.105000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc6e23a07 a2=241 a3=1b6 items=1 ppid=3215 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.108000 audit[3255]: AVC avc: denied { write } for pid=3255 comm="tee" name="fd" dev="proc" ino=29868 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.105000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 07:32:33.105000 audit: PATH item=0 name="/dev/fd/63" inode=29848 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.105000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.108000 audit[3255]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeedeb4a06 a2=241 a3=1b6 items=1 ppid=3220 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.108000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 07:32:33.108000 audit: PATH item=0 name="/dev/fd/63" inode=29311 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.108000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.164000 audit[3276]: AVC avc: denied { write } for pid=3276 comm="tee" name="fd" dev="proc" ino=29332 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.164000 audit[3276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0d805a06 a2=241 a3=1b6 items=1 ppid=3226 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.164000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 07:32:33.164000 audit: PATH item=0 name="/dev/fd/63" inode=29318 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.177000 audit[3281]: AVC avc: denied { write } for pid=3281 comm="tee" name="fd" dev="proc" ino=29336 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.177000 audit[3281]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9bb8c9f6 a2=241 a3=1b6 items=1 ppid=3225 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.180000 audit[3279]: AVC avc: denied { write } for pid=3279 comm="tee" name="fd" dev="proc" ino=29340 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.181000 audit[3284]: AVC avc: denied { write } for pid=3284 comm="tee" name="fd" dev="proc" ino=29344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.181000 audit[3284]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd0a90a06 a2=241 a3=1b6 items=1 ppid=3219 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.180000 audit[3279]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5676d9f7 a2=241 a3=1b6 items=1 ppid=3217 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.180000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 07:32:33.180000 audit: PATH item=0 name="/dev/fd/63" inode=29322 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.177000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 07:32:33.177000 audit: PATH item=0 name="/dev/fd/63" inode=29323 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.177000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.194000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=29348 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 07:32:33.194000 audit[3286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe42a3fa08 a2=241 a3=1b6 items=1 ppid=3214 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.194000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 07:32:33.194000 audit: PATH item=0 name="/dev/fd/63" inode=29329 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.194000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.181000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 07:32:33.181000 audit: PATH item=0 name="/dev/fd/63" inode=29326 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 07:32:33.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 07:32:33.232076 env[1198]: time="2024-12-13T07:32:33.231150759Z" level=info msg="StopPodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\"" Dec 13 07:32:33.232076 env[1198]: time="2024-12-13T07:32:33.231761301Z" level=info msg="StopPodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\"" Dec 13 07:32:33.391303 kubelet[2079]: I1213 07:32:33.383313 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-w544t" podStartSLOduration=3.584936709 podStartE2EDuration="30.378299048s" podCreationTimestamp="2024-12-13 07:32:03 +0000 UTC" firstStartedPulling="2024-12-13 07:32:03.978859692 +0000 UTC m=+22.068714645" lastFinishedPulling="2024-12-13 07:32:30.772222024 +0000 UTC m=+48.862076984" observedRunningTime="2024-12-13 07:32:31.552108457 +0000 UTC m=+49.641963433" watchObservedRunningTime="2024-12-13 07:32:33.378299048 +0000 UTC m=+51.468154014" Dec 13 07:32:33.527589 systemd[1]: run-containerd-runc-k8s.io-89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac-runc.VUYVbs.mount: Deactivated successfully. Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.376 [INFO][3316] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.377 [INFO][3316] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" iface="eth0" netns="/var/run/netns/cni-2835a9e1-6007-b10d-1734-4f3e836a4515" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.377 [INFO][3316] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" iface="eth0" netns="/var/run/netns/cni-2835a9e1-6007-b10d-1734-4f3e836a4515" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.382 [INFO][3316] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" iface="eth0" netns="/var/run/netns/cni-2835a9e1-6007-b10d-1734-4f3e836a4515" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.382 [INFO][3316] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.382 [INFO][3316] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.633 [INFO][3335] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.636 [INFO][3335] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.637 [INFO][3335] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.668 [WARNING][3335] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.668 [INFO][3335] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.674 [INFO][3335] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:33.682001 env[1198]: 2024-12-13 07:32:33.677 [INFO][3316] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:33.689014 env[1198]: time="2024-12-13T07:32:33.688279056Z" level=info msg="TearDown network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" successfully" Dec 13 07:32:33.689014 env[1198]: time="2024-12-13T07:32:33.688605088Z" level=info msg="StopPodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" returns successfully" Dec 13 07:32:33.685753 systemd[1]: run-netns-cni\x2d2835a9e1\x2d6007\x2db10d\x2d1734\x2d4f3e836a4515.mount: Deactivated successfully. Dec 13 07:32:33.696924 env[1198]: time="2024-12-13T07:32:33.696875915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-7z6q5,Uid:5fc826e7-bbe0-48ce-8c53-3b2740eaea10,Namespace:calico-apiserver,Attempt:1,}" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.391 [INFO][3324] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.392 [INFO][3324] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" iface="eth0" netns="/var/run/netns/cni-bb01bd05-3b13-599d-d52b-aa89af9e4cbd" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.394 [INFO][3324] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" iface="eth0" netns="/var/run/netns/cni-bb01bd05-3b13-599d-d52b-aa89af9e4cbd" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.396 [INFO][3324] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" iface="eth0" netns="/var/run/netns/cni-bb01bd05-3b13-599d-d52b-aa89af9e4cbd" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.396 [INFO][3324] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.396 [INFO][3324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.633 [INFO][3336] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.641 [INFO][3336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.674 [INFO][3336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.719 [WARNING][3336] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.720 [INFO][3336] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.725 [INFO][3336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:33.742331 env[1198]: 2024-12-13 07:32:33.737 [INFO][3324] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:33.742331 env[1198]: time="2024-12-13T07:32:33.741003789Z" level=info msg="TearDown network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" successfully" Dec 13 07:32:33.742331 env[1198]: time="2024-12-13T07:32:33.741049750Z" level=info msg="StopPodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" returns successfully" Dec 13 07:32:33.742331 env[1198]: time="2024-12-13T07:32:33.742197843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rm8p,Uid:0e75987e-db11-4ff0-9145-fdc18a5e98e0,Namespace:kube-system,Attempt:1,}" Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.885000 audit: BPF prog-id=142 op=LOAD Dec 13 07:32:33.885000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7be03620 a2=98 a3=3 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.885000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:33.886000 audit: BPF prog-id=142 op=UNLOAD Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.888000 audit: BPF prog-id=143 op=LOAD Dec 13 07:32:33.888000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7be03400 a2=74 a3=540051 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.888000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:33.889000 audit: BPF prog-id=143 op=UNLOAD Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:33.889000 audit: BPF prog-id=144 op=LOAD Dec 13 07:32:33.889000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7be03430 a2=94 a3=2 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:33.889000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:33.889000 audit: BPF prog-id=144 op=UNLOAD Dec 13 07:32:34.044721 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 07:32:34.044976 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia75792ce300: link becomes ready Dec 13 07:32:34.050568 systemd-networkd[1021]: calia75792ce300: Link UP Dec 13 07:32:34.051500 systemd-networkd[1021]: calia75792ce300: Gained carrier Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.857 [INFO][3396] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0 coredns-7db6d8ff4d- kube-system 0e75987e-db11-4ff0-9145-fdc18a5e98e0 796 0 2024-12-13 07:31:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-9sek4.gb1.brightbox.com coredns-7db6d8ff4d-4rm8p eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia75792ce300 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.857 [INFO][3396] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.942 [INFO][3426] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" HandleID="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.961 [INFO][3426] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" HandleID="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334db0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-9sek4.gb1.brightbox.com", "pod":"coredns-7db6d8ff4d-4rm8p", "timestamp":"2024-12-13 07:32:33.942425692 +0000 UTC"}, Hostname:"srv-9sek4.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.961 [INFO][3426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.961 [INFO][3426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.961 [INFO][3426] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-9sek4.gb1.brightbox.com' Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.972 [INFO][3426] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.985 [INFO][3426] ipam/ipam.go 372: Looking up existing affinities for host host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.995 [INFO][3426] ipam/ipam.go 489: Trying affinity for 192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:33.997 [INFO][3426] ipam/ipam.go 155: Attempting to load block cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.000 [INFO][3426] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.000 [INFO][3426] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.68.128/26 handle="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.002 [INFO][3426] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0 Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.007 [INFO][3426] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.68.128/26 handle="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.014 [INFO][3426] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.68.129/26] block=192.168.68.128/26 handle="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.014 [INFO][3426] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.68.129/26] handle="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.014 [INFO][3426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:34.100224 env[1198]: 2024-12-13 07:32:34.015 [INFO][3426] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.68.129/26] IPv6=[] ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" HandleID="k8s-pod-network.a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.101520 env[1198]: 2024-12-13 07:32:34.017 [INFO][3396] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0e75987e-db11-4ff0-9145-fdc18a5e98e0", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7db6d8ff4d-4rm8p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia75792ce300", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:34.101520 env[1198]: 2024-12-13 07:32:34.017 [INFO][3396] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.68.129/32] ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.101520 env[1198]: 2024-12-13 07:32:34.017 [INFO][3396] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia75792ce300 ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.101520 env[1198]: 2024-12-13 07:32:34.061 [INFO][3396] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.101520 env[1198]: 2024-12-13 07:32:34.061 [INFO][3396] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0e75987e-db11-4ff0-9145-fdc18a5e98e0", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0", Pod:"coredns-7db6d8ff4d-4rm8p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia75792ce300", MAC:"e2:11:9a:f2:78:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:34.101520 env[1198]: 2024-12-13 07:32:34.088 [INFO][3396] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rm8p" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:34.131102 systemd-networkd[1021]: calidf55a95ca2d: Link UP Dec 13 07:32:34.136176 systemd-networkd[1021]: calidf55a95ca2d: Gained carrier Dec 13 07:32:34.136887 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf55a95ca2d: link becomes ready Dec 13 07:32:34.139833 env[1198]: time="2024-12-13T07:32:34.137290244Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:34.139833 env[1198]: time="2024-12-13T07:32:34.137386040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:34.139833 env[1198]: time="2024-12-13T07:32:34.137404886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:34.148197 env[1198]: time="2024-12-13T07:32:34.147640891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0 pid=3458 runtime=io.containerd.runc.v2 Dec 13 07:32:34.169535 systemd[1]: Started cri-containerd-a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0.scope. Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:33.815 [INFO][3384] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0 calico-apiserver-5578c47b89- calico-apiserver 5fc826e7-bbe0-48ce-8c53-3b2740eaea10 795 0 2024-12-13 07:32:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5578c47b89 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-9sek4.gb1.brightbox.com calico-apiserver-5578c47b89-7z6q5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidf55a95ca2d [] []}} ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:33.816 [INFO][3384] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:33.941 [INFO][3416] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" HandleID="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:33.985 [INFO][3416] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" HandleID="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000446a80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-9sek4.gb1.brightbox.com", "pod":"calico-apiserver-5578c47b89-7z6q5", "timestamp":"2024-12-13 07:32:33.941140945 +0000 UTC"}, Hostname:"srv-9sek4.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:33.985 [INFO][3416] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.017 [INFO][3416] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.017 [INFO][3416] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-9sek4.gb1.brightbox.com' Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.021 [INFO][3416] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.030 [INFO][3416] ipam/ipam.go 372: Looking up existing affinities for host host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.055 [INFO][3416] ipam/ipam.go 489: Trying affinity for 192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.063 [INFO][3416] ipam/ipam.go 155: Attempting to load block cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.083 [INFO][3416] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.083 [INFO][3416] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.68.128/26 handle="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.090 [INFO][3416] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4 Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.108 [INFO][3416] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.68.128/26 handle="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.123 [INFO][3416] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.68.130/26] block=192.168.68.128/26 handle="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.123 [INFO][3416] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.68.130/26] handle="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.123 [INFO][3416] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:34.179896 env[1198]: 2024-12-13 07:32:34.123 [INFO][3416] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.68.130/26] IPv6=[] ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" HandleID="k8s-pod-network.c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.181441 env[1198]: 2024-12-13 07:32:34.126 [INFO][3384] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"5fc826e7-bbe0-48ce-8c53-3b2740eaea10", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-5578c47b89-7z6q5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf55a95ca2d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:34.181441 env[1198]: 2024-12-13 07:32:34.126 [INFO][3384] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.68.130/32] ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.181441 env[1198]: 2024-12-13 07:32:34.126 [INFO][3384] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidf55a95ca2d ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.181441 env[1198]: 2024-12-13 07:32:34.136 [INFO][3384] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.181441 env[1198]: 2024-12-13 07:32:34.139 [INFO][3384] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"5fc826e7-bbe0-48ce-8c53-3b2740eaea10", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4", Pod:"calico-apiserver-5578c47b89-7z6q5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf55a95ca2d", MAC:"7e:91:65:9f:13:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:34.181441 env[1198]: 2024-12-13 07:32:34.174 [INFO][3384] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-7z6q5" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:34.204410 env[1198]: time="2024-12-13T07:32:34.204305198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:34.204591 env[1198]: time="2024-12-13T07:32:34.204427268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:34.204591 env[1198]: time="2024-12-13T07:32:34.204489914Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:34.206591 env[1198]: time="2024-12-13T07:32:34.204757893Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4 pid=3501 runtime=io.containerd.runc.v2 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.218000 audit: BPF prog-id=145 op=LOAD Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3458 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656433376432646631643965623361393734303631643061636633 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3458 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656433376432646631643965623361393734303631643061636633 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit: BPF prog-id=146 op=LOAD Dec 13 07:32:34.219000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ca710 items=0 ppid=3458 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656433376432646631643965623361393734303631643061636633 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit: BPF prog-id=147 op=LOAD Dec 13 07:32:34.219000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ca758 items=0 ppid=3458 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656433376432646631643965623361393734303631643061636633 Dec 13 07:32:34.219000 audit: BPF prog-id=147 op=UNLOAD Dec 13 07:32:34.219000 audit: BPF prog-id=146 op=UNLOAD Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { perfmon } for pid=3471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit[3471]: AVC avc: denied { bpf } for pid=3471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.219000 audit: BPF prog-id=148 op=LOAD Dec 13 07:32:34.219000 audit[3471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cab68 items=0 ppid=3458 pid=3471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656433376432646631643965623361393734303631643061636633 Dec 13 07:32:34.233469 env[1198]: time="2024-12-13T07:32:34.233410298Z" level=info msg="StopPodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\"" Dec 13 07:32:34.241812 env[1198]: time="2024-12-13T07:32:34.239001917Z" level=info msg="StopPodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\"" Dec 13 07:32:34.245671 systemd[1]: Started cri-containerd-c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4.scope. Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.353000 audit: BPF prog-id=149 op=LOAD Dec 13 07:32:34.353000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7be032f0 a2=40 a3=1 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.353000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.354000 audit: BPF prog-id=149 op=UNLOAD Dec 13 07:32:34.354000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.354000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7be033c0 a2=50 a3=7fff7be034a0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.354000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.366149 env[1198]: time="2024-12-13T07:32:34.364064921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rm8p,Uid:0e75987e-db11-4ff0-9145-fdc18a5e98e0,Namespace:kube-system,Attempt:1,} returns sandbox id \"a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0\"" Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.370000 audit: BPF prog-id=150 op=LOAD Dec 13 07:32:34.373000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.373000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3501 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646462303562636463613761613665643361633864373562616234 Dec 13 07:32:34.373000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.373000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3501 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646462303562636463613761613665643361633864373562616234 Dec 13 07:32:34.381437 env[1198]: time="2024-12-13T07:32:34.381376289Z" level=info msg="CreateContainer within sandbox \"a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.381000 audit: BPF prog-id=151 op=LOAD Dec 13 07:32:34.381000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092380 items=0 ppid=3501 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646462303562636463613761613665643361633864373562616234 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.382000 audit: BPF prog-id=152 op=LOAD Dec 13 07:32:34.382000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000923c8 items=0 ppid=3501 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646462303562636463613761613665643361633864373562616234 Dec 13 07:32:34.391000 audit: BPF prog-id=152 op=UNLOAD Dec 13 07:32:34.391000 audit: BPF prog-id=151 op=UNLOAD Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.391000 audit: BPF prog-id=153 op=LOAD Dec 13 07:32:34.391000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000927d8 items=0 ppid=3501 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646462303562636463613761613665643361633864373562616234 Dec 13 07:32:34.438429 env[1198]: time="2024-12-13T07:32:34.438370464Z" level=info msg="CreateContainer within sandbox \"a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c1300a494131608747c752f8f311a50f7a06e1a87d4028297669f1e138d30a44\"" Dec 13 07:32:34.439587 env[1198]: time="2024-12-13T07:32:34.439552856Z" level=info msg="StartContainer for \"c1300a494131608747c752f8f311a50f7a06e1a87d4028297669f1e138d30a44\"" Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7be03300 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7be03330 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7be03240 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7be03350 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7be03330 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7be03320 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7be03350 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7be03330 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7be03350 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7be03320 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7be03390 a2=28 a3=0 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7be03140 a2=50 a3=1 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.481000 audit: BPF prog-id=154 op=LOAD Dec 13 07:32:34.481000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7be03140 a2=94 a3=5 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.482000 audit: BPF prog-id=154 op=UNLOAD Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7be031f0 a2=50 a3=1 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff7be03310 a2=4 a3=38 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.482000 audit[3430]: AVC avc: denied { confidentiality } for pid=3430 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 07:32:34.482000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7be03360 a2=94 a3=6 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.482000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.483000 audit[3430]: AVC avc: denied { confidentiality } for pid=3430 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 07:32:34.483000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7be02b10 a2=94 a3=83 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.484000 audit[3430]: AVC avc: denied { confidentiality } for pid=3430 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 07:32:34.484000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7be02b10 a2=94 a3=83 items=0 ppid=3222 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.484000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.501000 audit: BPF prog-id=155 op=LOAD Dec 13 07:32:34.501000 audit[3595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5e2c94e0 a2=98 a3=1999999999999999 items=0 ppid=3222 pid=3595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.501000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 07:32:34.502000 audit: BPF prog-id=155 op=UNLOAD Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit: BPF prog-id=156 op=LOAD Dec 13 07:32:34.502000 audit[3595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5e2c93c0 a2=74 a3=ffff items=0 ppid=3222 pid=3595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.502000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 07:32:34.502000 audit: BPF prog-id=156 op=UNLOAD Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { perfmon } for pid=3595 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit[3595]: AVC avc: denied { bpf } for pid=3595 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.502000 audit: BPF prog-id=157 op=LOAD Dec 13 07:32:34.502000 audit[3595]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5e2c9400 a2=40 a3=7ffe5e2c95e0 items=0 ppid=3222 pid=3595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.502000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 07:32:34.502000 audit: BPF prog-id=157 op=UNLOAD Dec 13 07:32:34.523620 systemd[1]: run-netns-cni\x2dbb01bd05\x2d3b13\x2d599d\x2dd52b\x2daa89af9e4cbd.mount: Deactivated successfully. Dec 13 07:32:34.548895 env[1198]: time="2024-12-13T07:32:34.548841273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-7z6q5,Uid:5fc826e7-bbe0-48ce-8c53-3b2740eaea10,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4\"" Dec 13 07:32:34.555710 env[1198]: time="2024-12-13T07:32:34.555672373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.428 [INFO][3544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.428 [INFO][3544] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" iface="eth0" netns="/var/run/netns/cni-5c2676b8-2c2d-2a04-abee-1e54a7c11f38" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.429 [INFO][3544] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" iface="eth0" netns="/var/run/netns/cni-5c2676b8-2c2d-2a04-abee-1e54a7c11f38" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.429 [INFO][3544] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" iface="eth0" netns="/var/run/netns/cni-5c2676b8-2c2d-2a04-abee-1e54a7c11f38" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.429 [INFO][3544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.429 [INFO][3544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.562 [INFO][3575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.565 [INFO][3575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.565 [INFO][3575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.580 [WARNING][3575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.580 [INFO][3575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.588 [INFO][3575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:34.601951 env[1198]: 2024-12-13 07:32:34.590 [INFO][3544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:34.612831 env[1198]: time="2024-12-13T07:32:34.608312752Z" level=info msg="TearDown network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" successfully" Dec 13 07:32:34.613123 env[1198]: time="2024-12-13T07:32:34.613056562Z" level=info msg="StopPodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" returns successfully" Dec 13 07:32:34.613555 systemd[1]: run-netns-cni\x2d5c2676b8\x2d2c2d\x2d2a04\x2dabee\x2d1e54a7c11f38.mount: Deactivated successfully. Dec 13 07:32:34.618456 env[1198]: time="2024-12-13T07:32:34.614556061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-qftcv,Uid:032a4e98-b393-40cf-814f-27eb5e70c7cb,Namespace:calico-apiserver,Attempt:1,}" Dec 13 07:32:34.617340 systemd[1]: Started cri-containerd-c1300a494131608747c752f8f311a50f7a06e1a87d4028297669f1e138d30a44.scope. Dec 13 07:32:34.631328 systemd[1]: run-containerd-runc-k8s.io-c1300a494131608747c752f8f311a50f7a06e1a87d4028297669f1e138d30a44-runc.3Au8W7.mount: Deactivated successfully. Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.450 [INFO][3553] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.450 [INFO][3553] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" iface="eth0" netns="/var/run/netns/cni-64537442-34a8-7c47-dca1-50c67568f285" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.450 [INFO][3553] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" iface="eth0" netns="/var/run/netns/cni-64537442-34a8-7c47-dca1-50c67568f285" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.451 [INFO][3553] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" iface="eth0" netns="/var/run/netns/cni-64537442-34a8-7c47-dca1-50c67568f285" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.451 [INFO][3553] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.451 [INFO][3553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.643 [INFO][3581] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.643 [INFO][3581] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.644 [INFO][3581] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.651 [WARNING][3581] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.651 [INFO][3581] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.658 [INFO][3581] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:34.661764 env[1198]: 2024-12-13 07:32:34.660 [INFO][3553] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:34.662824 env[1198]: time="2024-12-13T07:32:34.662747672Z" level=info msg="TearDown network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" successfully" Dec 13 07:32:34.662949 env[1198]: time="2024-12-13T07:32:34.662916576Z" level=info msg="StopPodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" returns successfully" Dec 13 07:32:34.664001 env[1198]: time="2024-12-13T07:32:34.663965105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-b2m79,Uid:9516a2ff-3e68-4f87-82e0-4c53ce709c36,Namespace:kube-system,Attempt:1,}" Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.679000 audit: BPF prog-id=158 op=LOAD Dec 13 07:32:34.683000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.683000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3458 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333030613439343133313630383734376337353266386633313161 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3458 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333030613439343133313630383734376337353266386633313161 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.684000 audit: BPF prog-id=159 op=LOAD Dec 13 07:32:34.684000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f62e0 items=0 ppid=3458 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333030613439343133313630383734376337353266386633313161 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.686000 audit: BPF prog-id=160 op=LOAD Dec 13 07:32:34.686000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f6328 items=0 ppid=3458 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333030613439343133313630383734376337353266386633313161 Dec 13 07:32:34.689000 audit: BPF prog-id=160 op=UNLOAD Dec 13 07:32:34.689000 audit: BPF prog-id=159 op=UNLOAD Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.689000 audit: BPF prog-id=161 op=LOAD Dec 13 07:32:34.689000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002f6738 items=0 ppid=3458 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333030613439343133313630383734376337353266386633313161 Dec 13 07:32:34.728271 systemd-networkd[1021]: vxlan.calico: Link UP Dec 13 07:32:34.728284 systemd-networkd[1021]: vxlan.calico: Gained carrier Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.829000 audit: BPF prog-id=162 op=LOAD Dec 13 07:32:34.829000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea53a3340 a2=98 a3=100 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.829000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.829000 audit: BPF prog-id=162 op=UNLOAD Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.830000 audit: BPF prog-id=163 op=LOAD Dec 13 07:32:34.830000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea53a3150 a2=74 a3=540051 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.830000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit: BPF prog-id=163 op=UNLOAD Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit: BPF prog-id=164 op=LOAD Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea53a3180 a2=94 a3=2 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit: BPF prog-id=164 op=UNLOAD Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea53a3050 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea53a3080 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea53a2f90 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea53a30a0 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea53a3080 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea53a3070 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea53a30a0 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea53a3080 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea53a30a0 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea53a3070 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffea53a30e0 a2=28 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.832000 audit: BPF prog-id=165 op=LOAD Dec 13 07:32:34.832000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea53a2f50 a2=40 a3=0 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.832000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.835000 audit: BPF prog-id=165 op=UNLOAD Dec 13 07:32:34.836000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.836000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffea53a2f40 a2=50 a3=2800 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.836000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.836000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.836000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffea53a2f40 a2=50 a3=2800 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.836000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit: BPF prog-id=166 op=LOAD Dec 13 07:32:34.837000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea53a2760 a2=94 a3=2 items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.837000 audit: BPF prog-id=166 op=UNLOAD Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { perfmon } for pid=3674 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit[3674]: AVC avc: denied { bpf } for pid=3674 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.837000 audit: BPF prog-id=167 op=LOAD Dec 13 07:32:34.837000 audit[3674]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea53a2860 a2=94 a3=2d items=0 ppid=3222 pid=3674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.873000 audit: BPF prog-id=168 op=LOAD Dec 13 07:32:34.873000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd97fcd2f0 a2=98 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:34.890000 audit: BPF prog-id=168 op=UNLOAD Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.893000 audit: BPF prog-id=169 op=LOAD Dec 13 07:32:34.893000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd97fcd0d0 a2=74 a3=540051 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.893000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:34.895000 audit: BPF prog-id=169 op=UNLOAD Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:34.895000 audit: BPF prog-id=170 op=LOAD Dec 13 07:32:34.895000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd97fcd100 a2=94 a3=2 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:34.895000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:34.895000 audit: BPF prog-id=170 op=UNLOAD Dec 13 07:32:34.915820 env[1198]: time="2024-12-13T07:32:34.913306500Z" level=info msg="StartContainer for \"c1300a494131608747c752f8f311a50f7a06e1a87d4028297669f1e138d30a44\" returns successfully" Dec 13 07:32:35.172483 systemd-networkd[1021]: cali8d519e966b2: Link UP Dec 13 07:32:35.180205 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8d519e966b2: link becomes ready Dec 13 07:32:35.179920 systemd-networkd[1021]: cali8d519e966b2: Gained carrier Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:34.893 [INFO][3642] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0 coredns-7db6d8ff4d- kube-system 9516a2ff-3e68-4f87-82e0-4c53ce709c36 812 0 2024-12-13 07:31:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-9sek4.gb1.brightbox.com coredns-7db6d8ff4d-b2m79 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8d519e966b2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:34.893 [INFO][3642] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.101 [INFO][3693] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" HandleID="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.119 [INFO][3693] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" HandleID="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004078a0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-9sek4.gb1.brightbox.com", "pod":"coredns-7db6d8ff4d-b2m79", "timestamp":"2024-12-13 07:32:35.101878425 +0000 UTC"}, Hostname:"srv-9sek4.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.119 [INFO][3693] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.119 [INFO][3693] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.119 [INFO][3693] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-9sek4.gb1.brightbox.com' Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.128 [INFO][3693] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.135 [INFO][3693] ipam/ipam.go 372: Looking up existing affinities for host host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.140 [INFO][3693] ipam/ipam.go 489: Trying affinity for 192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.143 [INFO][3693] ipam/ipam.go 155: Attempting to load block cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.146 [INFO][3693] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.146 [INFO][3693] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.68.128/26 handle="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.150 [INFO][3693] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.158 [INFO][3693] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.68.128/26 handle="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.165 [INFO][3693] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.68.131/26] block=192.168.68.128/26 handle="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.166 [INFO][3693] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.68.131/26] handle="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.166 [INFO][3693] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:35.203707 env[1198]: 2024-12-13 07:32:35.166 [INFO][3693] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.68.131/26] IPv6=[] ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" HandleID="k8s-pod-network.ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.205134 env[1198]: 2024-12-13 07:32:35.168 [INFO][3642] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"9516a2ff-3e68-4f87-82e0-4c53ce709c36", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7db6d8ff4d-b2m79", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8d519e966b2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:35.205134 env[1198]: 2024-12-13 07:32:35.168 [INFO][3642] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.68.131/32] ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.205134 env[1198]: 2024-12-13 07:32:35.168 [INFO][3642] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8d519e966b2 ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.205134 env[1198]: 2024-12-13 07:32:35.181 [INFO][3642] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.205134 env[1198]: 2024-12-13 07:32:35.181 [INFO][3642] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"9516a2ff-3e68-4f87-82e0-4c53ce709c36", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b", Pod:"coredns-7db6d8ff4d-b2m79", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8d519e966b2", MAC:"ae:59:48:e8:0f:4e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:35.205134 env[1198]: 2024-12-13 07:32:35.202 [INFO][3642] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-b2m79" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:35.239592 env[1198]: time="2024-12-13T07:32:35.239502734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:35.242602 env[1198]: time="2024-12-13T07:32:35.242543723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:35.242932 env[1198]: time="2024-12-13T07:32:35.242880221Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:35.243429 env[1198]: time="2024-12-13T07:32:35.243370494Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b pid=3729 runtime=io.containerd.runc.v2 Dec 13 07:32:35.255928 systemd-networkd[1021]: cali6f86a00d1ff: Link UP Dec 13 07:32:35.263838 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f86a00d1ff: link becomes ready Dec 13 07:32:35.261468 systemd-networkd[1021]: cali6f86a00d1ff: Gained carrier Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:34.935 [INFO][3632] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0 calico-apiserver-5578c47b89- calico-apiserver 032a4e98-b393-40cf-814f-27eb5e70c7cb 810 0 2024-12-13 07:32:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5578c47b89 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-9sek4.gb1.brightbox.com calico-apiserver-5578c47b89-qftcv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6f86a00d1ff [] []}} ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:34.941 [INFO][3632] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.102 [INFO][3694] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" HandleID="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.127 [INFO][3694] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" HandleID="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318bd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-9sek4.gb1.brightbox.com", "pod":"calico-apiserver-5578c47b89-qftcv", "timestamp":"2024-12-13 07:32:35.099811106 +0000 UTC"}, Hostname:"srv-9sek4.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.127 [INFO][3694] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.166 [INFO][3694] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.166 [INFO][3694] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-9sek4.gb1.brightbox.com' Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.184 [INFO][3694] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.197 [INFO][3694] ipam/ipam.go 372: Looking up existing affinities for host host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.210 [INFO][3694] ipam/ipam.go 489: Trying affinity for 192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.215 [INFO][3694] ipam/ipam.go 155: Attempting to load block cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.219 [INFO][3694] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.219 [INFO][3694] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.68.128/26 handle="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.222 [INFO][3694] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.232 [INFO][3694] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.68.128/26 handle="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.243 [INFO][3694] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.68.132/26] block=192.168.68.128/26 handle="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.243 [INFO][3694] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.68.132/26] handle="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.243 [INFO][3694] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:35.289964 env[1198]: 2024-12-13 07:32:35.243 [INFO][3694] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.68.132/26] IPv6=[] ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" HandleID="k8s-pod-network.435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.291186 env[1198]: 2024-12-13 07:32:35.245 [INFO][3632] cni-plugin/k8s.go 386: Populated endpoint ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"032a4e98-b393-40cf-814f-27eb5e70c7cb", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-5578c47b89-qftcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6f86a00d1ff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:35.291186 env[1198]: 2024-12-13 07:32:35.246 [INFO][3632] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.68.132/32] ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.291186 env[1198]: 2024-12-13 07:32:35.246 [INFO][3632] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6f86a00d1ff ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.291186 env[1198]: 2024-12-13 07:32:35.265 [INFO][3632] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.291186 env[1198]: 2024-12-13 07:32:35.265 [INFO][3632] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"032a4e98-b393-40cf-814f-27eb5e70c7cb", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a", Pod:"calico-apiserver-5578c47b89-qftcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6f86a00d1ff", MAC:"2e:f7:91:08:7e:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:35.291186 env[1198]: 2024-12-13 07:32:35.288 [INFO][3632] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a" Namespace="calico-apiserver" Pod="calico-apiserver-5578c47b89-qftcv" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:35.320783 systemd[1]: Started cri-containerd-ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b.scope. Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.320000 audit: BPF prog-id=171 op=LOAD Dec 13 07:32:35.320000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd97fccfc0 a2=40 a3=1 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.320000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.328000 audit: BPF prog-id=171 op=UNLOAD Dec 13 07:32:35.328000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.328000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd97fcd090 a2=50 a3=7ffd97fcd170 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.328000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.341610 env[1198]: time="2024-12-13T07:32:35.341517248Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:35.341886 env[1198]: time="2024-12-13T07:32:35.341832501Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:35.342405 env[1198]: time="2024-12-13T07:32:35.342182832Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:35.342654 env[1198]: time="2024-12-13T07:32:35.342594334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a pid=3765 runtime=io.containerd.runc.v2 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.353000 audit: BPF prog-id=172 op=LOAD Dec 13 07:32:35.354000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.354000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616331313737666262363438346539346466383135303835373036 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616331313737666262363438346539346466383135303835373036 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.355000 audit: BPF prog-id=173 op=LOAD Dec 13 07:32:35.355000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024b50 items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616331313737666262363438346539346466383135303835373036 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.357000 audit: BPF prog-id=174 op=LOAD Dec 13 07:32:35.357000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024b98 items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616331313737666262363438346539346466383135303835373036 Dec 13 07:32:35.358000 audit: BPF prog-id=174 op=UNLOAD Dec 13 07:32:35.358000 audit: BPF prog-id=173 op=UNLOAD Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.358000 audit: BPF prog-id=175 op=LOAD Dec 13 07:32:35.358000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024fa8 items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562616331313737666262363438346539346466383135303835373036 Dec 13 07:32:35.391142 systemd[1]: Started cri-containerd-435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a.scope. Dec 13 07:32:35.445000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465021 env[1198]: time="2024-12-13T07:32:35.464965382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-b2m79,Uid:9516a2ff-3e68-4f87-82e0-4c53ce709c36,Namespace:kube-system,Attempt:1,} returns sandbox id \"ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b\"" Dec 13 07:32:35.445000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd97fccfd0 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd97fcd000 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd97fccf10 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd97fcd020 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd97fcd000 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd97fccff0 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd97fcd020 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd97fcd000 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd97fcd020 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd97fccff0 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.464000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.464000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd97fcd060 a2=28 a3=0 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.464000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd97fcce10 a2=50 a3=1 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit: BPF prog-id=176 op=LOAD Dec 13 07:32:35.465000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd97fcce10 a2=94 a3=5 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.465000 audit: BPF prog-id=176 op=UNLOAD Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd97fccec0 a2=50 a3=1 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd97fccfe0 a2=4 a3=38 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { confidentiality } for pid=3690 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 07:32:35.465000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd97fcd030 a2=94 a3=6 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.465000 audit[3690]: AVC avc: denied { confidentiality } for pid=3690 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 07:32:35.465000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd97fcc7e0 a2=94 a3=83 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.466000 audit[3690]: AVC avc: denied { confidentiality } for pid=3690 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 07:32:35.466000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd97fcc7e0 a2=94 a3=83 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.467000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.467000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd97fce220 a2=10 a3=f1f00800 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.467000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.468000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.468000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd97fce0c0 a2=10 a3=3 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.468000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.468000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd97fce060 a2=10 a3=3 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.468000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.468000 audit[3690]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd97fce060 a2=10 a3=7 items=0 ppid=3222 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.468000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 07:32:35.480587 env[1198]: time="2024-12-13T07:32:35.480268559Z" level=info msg="CreateContainer within sandbox \"ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit: BPF prog-id=177 op=LOAD Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3765 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356561316661396331623265396630353030396438663565636663 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3765 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356561316661396331623265396630353030396438663565636663 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit: BPF prog-id=178 op=LOAD Dec 13 07:32:35.483000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7be0 items=0 ppid=3765 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356561316661396331623265396630353030396438663565636663 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.483000 audit: BPF prog-id=179 op=LOAD Dec 13 07:32:35.483000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7c28 items=0 ppid=3765 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356561316661396331623265396630353030396438663565636663 Dec 13 07:32:35.483000 audit: BPF prog-id=179 op=UNLOAD Dec 13 07:32:35.483000 audit: BPF prog-id=178 op=UNLOAD Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.484000 audit: BPF prog-id=180 op=LOAD Dec 13 07:32:35.484000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4038 items=0 ppid=3765 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356561316661396331623265396630353030396438663565636663 Dec 13 07:32:35.485000 audit: BPF prog-id=167 op=UNLOAD Dec 13 07:32:35.519501 systemd[1]: run-netns-cni\x2d64537442\x2d34a8\x2d7c47\x2ddca1\x2d50c67568f285.mount: Deactivated successfully. Dec 13 07:32:35.542073 env[1198]: time="2024-12-13T07:32:35.541990005Z" level=info msg="CreateContainer within sandbox \"ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2489ba9bdb20fb0a75875f184598387dee53d1d02655b51660e3394e1d10fc65\"" Dec 13 07:32:35.545472 env[1198]: time="2024-12-13T07:32:35.545385163Z" level=info msg="StartContainer for \"2489ba9bdb20fb0a75875f184598387dee53d1d02655b51660e3394e1d10fc65\"" Dec 13 07:32:35.625499 systemd[1]: Started cri-containerd-2489ba9bdb20fb0a75875f184598387dee53d1d02655b51660e3394e1d10fc65.scope. Dec 13 07:32:35.647946 systemd[1]: run-containerd-runc-k8s.io-2489ba9bdb20fb0a75875f184598387dee53d1d02655b51660e3394e1d10fc65-runc.lAlpWU.mount: Deactivated successfully. Dec 13 07:32:35.662496 env[1198]: time="2024-12-13T07:32:35.662433336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5578c47b89-qftcv,Uid:032a4e98-b393-40cf-814f-27eb5e70c7cb,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a\"" Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.690000 audit: BPF prog-id=181 op=LOAD Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3729 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383962613962646232306662306137353837356631383435393833 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3729 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383962613962646232306662306137353837356631383435393833 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.691000 audit: BPF prog-id=182 op=LOAD Dec 13 07:32:35.691000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00027e930 items=0 ppid=3729 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383962613962646232306662306137353837356631383435393833 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit: BPF prog-id=183 op=LOAD Dec 13 07:32:35.692000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00027e978 items=0 ppid=3729 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383962613962646232306662306137353837356631383435393833 Dec 13 07:32:35.692000 audit: BPF prog-id=183 op=UNLOAD Dec 13 07:32:35.692000 audit: BPF prog-id=182 op=UNLOAD Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { perfmon } for pid=3818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit[3818]: AVC avc: denied { bpf } for pid=3818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:35.692000 audit: BPF prog-id=184 op=LOAD Dec 13 07:32:35.692000 audit[3818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00027ed88 items=0 ppid=3729 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383962613962646232306662306137353837356631383435393833 Dec 13 07:32:35.719681 env[1198]: time="2024-12-13T07:32:35.719534912Z" level=info msg="StartContainer for \"2489ba9bdb20fb0a75875f184598387dee53d1d02655b51660e3394e1d10fc65\" returns successfully" Dec 13 07:32:35.723948 systemd-networkd[1021]: calia75792ce300: Gained IPv6LL Dec 13 07:32:35.788000 audit[3866]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:35.788000 audit[3866]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd66687040 a2=0 a3=7ffd6668702c items=0 ppid=2260 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:35.792000 audit[3866]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:35.792000 audit[3866]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd66687040 a2=0 a3=0 items=0 ppid=2260 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:35.848110 systemd-networkd[1021]: calidf55a95ca2d: Gained IPv6LL Dec 13 07:32:35.865000 audit[3882]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3882 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:35.865000 audit[3882]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe4fe5e6d0 a2=0 a3=7ffe4fe5e6bc items=0 ppid=3222 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.865000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:35.884000 audit[3881]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:35.884000 audit[3881]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe76ce9680 a2=0 a3=7ffe76ce966c items=0 ppid=3222 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.884000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:35.894000 audit[3885]: NETFILTER_CFG table=filter:101 family=2 entries=105 op=nft_register_chain pid=3885 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:35.894000 audit[3885]: SYSCALL arch=c000003e syscall=46 success=yes exit=58184 a0=3 a1=7ffdb50c0840 a2=0 a3=7ffdb50c082c items=0 ppid=3222 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:35.896000 audit[3883]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:35.896000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe8805b650 a2=0 a3=55e0a1ff7000 items=0 ppid=3222 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.896000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:35.972000 audit[3895]: NETFILTER_CFG table=filter:103 family=2 entries=60 op=nft_register_chain pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:35.972000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=35648 a0=3 a1=7ffc14f99a90 a2=0 a3=7ffc14f99a7c items=0 ppid=3222 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:35.972000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:36.473120 kernel: kauditd_printk_skb: 899 callbacks suppressed Dec 13 07:32:36.473919 kernel: audit: type=1400 audit(1734075156.461:1210): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:36.461000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:36.473000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:36.481888 kernel: audit: type=1400 audit(1734075156.473:1211): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:36.473000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030d8160 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:36.491240 kernel: audit: type=1300 audit(1734075156.473:1211): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030d8160 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:36.491378 kernel: audit: type=1327 audit(1734075156.473:1211): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:36.473000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:36.461000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c28d50 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:36.505320 kernel: audit: type=1300 audit(1734075156.461:1210): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c28d50 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:36.505506 kernel: audit: type=1327 audit(1734075156.461:1210): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:36.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:36.564427 kubelet[2079]: I1213 07:32:36.563361 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-4rm8p" podStartSLOduration=41.563314527 podStartE2EDuration="41.563314527s" podCreationTimestamp="2024-12-13 07:31:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 07:32:35.60423879 +0000 UTC m=+53.694093747" watchObservedRunningTime="2024-12-13 07:32:36.563314527 +0000 UTC m=+54.653169495" Dec 13 07:32:36.572493 kubelet[2079]: I1213 07:32:36.572416 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-b2m79" podStartSLOduration=41.572398266 podStartE2EDuration="41.572398266s" podCreationTimestamp="2024-12-13 07:31:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 07:32:36.569724757 +0000 UTC m=+54.659579735" watchObservedRunningTime="2024-12-13 07:32:36.572398266 +0000 UTC m=+54.662253226" Dec 13 07:32:36.617401 systemd-networkd[1021]: vxlan.calico: Gained IPv6LL Dec 13 07:32:36.771000 audit[3897]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:36.771000 audit[3897]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd5bf80350 a2=0 a3=7ffd5bf8033c items=0 ppid=2260 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:36.783220 kernel: audit: type=1325 audit(1734075156.771:1212): table=filter:104 family=2 entries=16 op=nft_register_rule pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:36.783387 kernel: audit: type=1300 audit(1734075156.771:1212): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd5bf80350 a2=0 a3=7ffd5bf8033c items=0 ppid=2260 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:36.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:36.784000 audit[3897]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:36.793906 kernel: audit: type=1327 audit(1734075156.771:1212): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:36.794009 kernel: audit: type=1325 audit(1734075156.784:1213): table=nat:105 family=2 entries=14 op=nft_register_rule pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:36.784000 audit[3897]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd5bf80350 a2=0 a3=0 items=0 ppid=2260 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:36.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:36.816000 audit[3899]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:36.816000 audit[3899]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe6135e200 a2=0 a3=7ffe6135e1ec items=0 ppid=2260 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:36.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:36.835000 audit[3899]: NETFILTER_CFG table=nat:107 family=2 entries=47 op=nft_register_chain pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:36.835000 audit[3899]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe6135e200 a2=0 a3=7ffe6135e1ec items=0 ppid=2260 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:36.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:36.872207 systemd-networkd[1021]: cali8d519e966b2: Gained IPv6LL Dec 13 07:32:36.936196 systemd-networkd[1021]: cali6f86a00d1ff: Gained IPv6LL Dec 13 07:32:38.000000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:38.000000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:38.000000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00eb7b950 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:32:38.000000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:32:38.000000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00e975770 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:32:38.000000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:32:38.005000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:38.005000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:38.005000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00fb02160 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:32:38.005000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:32:38.005000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00eb7bad0 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:32:38.005000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:32:38.162000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:38.162000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00f985920 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:32:38.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:32:38.166000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:38.166000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ee40780 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:32:38.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:32:38.481413 env[1198]: time="2024-12-13T07:32:38.481236433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.484925 env[1198]: time="2024-12-13T07:32:38.484892946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.488001 env[1198]: time="2024-12-13T07:32:38.487876874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 07:32:38.488727 env[1198]: time="2024-12-13T07:32:38.486941933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.491091 env[1198]: time="2024-12-13T07:32:38.491028753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.495050 env[1198]: time="2024-12-13T07:32:38.495011925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 07:32:38.500396 env[1198]: time="2024-12-13T07:32:38.500316749Z" level=info msg="CreateContainer within sandbox \"c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 07:32:38.523613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1512721168.mount: Deactivated successfully. Dec 13 07:32:38.526924 env[1198]: time="2024-12-13T07:32:38.526862216Z" level=info msg="CreateContainer within sandbox \"c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1430e5ffd8c0410d3180f2833dcfc98559c29425a6b1db132b2cd7a6d0311f18\"" Dec 13 07:32:38.529404 env[1198]: time="2024-12-13T07:32:38.528069476Z" level=info msg="StartContainer for \"1430e5ffd8c0410d3180f2833dcfc98559c29425a6b1db132b2cd7a6d0311f18\"" Dec 13 07:32:38.584040 systemd[1]: Started cri-containerd-1430e5ffd8c0410d3180f2833dcfc98559c29425a6b1db132b2cd7a6d0311f18.scope. Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.694000 audit: BPF prog-id=185 op=LOAD Dec 13 07:32:38.696000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.696000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3501 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333065356666643863303431306433313830663238333364636663 Dec 13 07:32:38.696000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.696000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3501 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333065356666643863303431306433313830663238333364636663 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.697000 audit: BPF prog-id=186 op=LOAD Dec 13 07:32:38.697000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229270 items=0 ppid=3501 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333065356666643863303431306433313830663238333364636663 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.698000 audit: BPF prog-id=187 op=LOAD Dec 13 07:32:38.698000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002292b8 items=0 ppid=3501 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333065356666643863303431306433313830663238333364636663 Dec 13 07:32:38.699000 audit: BPF prog-id=187 op=UNLOAD Dec 13 07:32:38.700000 audit: BPF prog-id=186 op=UNLOAD Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { perfmon } for pid=3910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit[3910]: AVC avc: denied { bpf } for pid=3910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.700000 audit: BPF prog-id=188 op=LOAD Dec 13 07:32:38.700000 audit[3910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002296c8 items=0 ppid=3501 pid=3910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333065356666643863303431306433313830663238333364636663 Dec 13 07:32:38.751570 env[1198]: time="2024-12-13T07:32:38.751513289Z" level=info msg="StartContainer for \"1430e5ffd8c0410d3180f2833dcfc98559c29425a6b1db132b2cd7a6d0311f18\" returns successfully" Dec 13 07:32:38.840969 env[1198]: time="2024-12-13T07:32:38.840830003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.843170 env[1198]: time="2024-12-13T07:32:38.843131516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.845273 env[1198]: time="2024-12-13T07:32:38.845237775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.846887 env[1198]: time="2024-12-13T07:32:38.846833557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:38.847586 env[1198]: time="2024-12-13T07:32:38.847549381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 07:32:38.852551 env[1198]: time="2024-12-13T07:32:38.852509914Z" level=info msg="CreateContainer within sandbox \"435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 07:32:38.867922 env[1198]: time="2024-12-13T07:32:38.867849253Z" level=info msg="CreateContainer within sandbox \"435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"bc667aaef2c56b8dd6de45f7e962cb107cd52a5267520ce9cd92975baff3febe\"" Dec 13 07:32:38.868990 env[1198]: time="2024-12-13T07:32:38.868957377Z" level=info msg="StartContainer for \"bc667aaef2c56b8dd6de45f7e962cb107cd52a5267520ce9cd92975baff3febe\"" Dec 13 07:32:38.909111 systemd[1]: Started cri-containerd-bc667aaef2c56b8dd6de45f7e962cb107cd52a5267520ce9cd92975baff3febe.scope. Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.941000 audit: BPF prog-id=189 op=LOAD Dec 13 07:32:38.942000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.942000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3765 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263363637616165663263353662386464366465343566376539363263 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3765 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263363637616165663263353662386464366465343566376539363263 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.943000 audit: BPF prog-id=190 op=LOAD Dec 13 07:32:38.943000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001f0130 items=0 ppid=3765 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263363637616165663263353662386464366465343566376539363263 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.944000 audit: BPF prog-id=191 op=LOAD Dec 13 07:32:38.944000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001f0178 items=0 ppid=3765 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263363637616165663263353662386464366465343566376539363263 Dec 13 07:32:38.945000 audit: BPF prog-id=191 op=UNLOAD Dec 13 07:32:38.945000 audit: BPF prog-id=190 op=UNLOAD Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:38.945000 audit: BPF prog-id=192 op=LOAD Dec 13 07:32:38.945000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001f0588 items=0 ppid=3765 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:38.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263363637616165663263353662386464366465343566376539363263 Dec 13 07:32:39.000309 env[1198]: time="2024-12-13T07:32:39.000212325Z" level=info msg="StartContainer for \"bc667aaef2c56b8dd6de45f7e962cb107cd52a5267520ce9cd92975baff3febe\" returns successfully" Dec 13 07:32:39.516307 systemd[1]: run-containerd-runc-k8s.io-1430e5ffd8c0410d3180f2833dcfc98559c29425a6b1db132b2cd7a6d0311f18-runc.8v9yRF.mount: Deactivated successfully. Dec 13 07:32:39.607439 kubelet[2079]: I1213 07:32:39.607325 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5578c47b89-qftcv" podStartSLOduration=33.423608185 podStartE2EDuration="36.607249497s" podCreationTimestamp="2024-12-13 07:32:03 +0000 UTC" firstStartedPulling="2024-12-13 07:32:35.665934393 +0000 UTC m=+53.755789353" lastFinishedPulling="2024-12-13 07:32:38.8495757 +0000 UTC m=+56.939430665" observedRunningTime="2024-12-13 07:32:39.585126304 +0000 UTC m=+57.674981264" watchObservedRunningTime="2024-12-13 07:32:39.607249497 +0000 UTC m=+57.697104464" Dec 13 07:32:39.608535 kubelet[2079]: I1213 07:32:39.607496 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5578c47b89-7z6q5" podStartSLOduration=32.665841707 podStartE2EDuration="36.607488197s" podCreationTimestamp="2024-12-13 07:32:03 +0000 UTC" firstStartedPulling="2024-12-13 07:32:34.551753899 +0000 UTC m=+52.641608857" lastFinishedPulling="2024-12-13 07:32:38.493400392 +0000 UTC m=+56.583255347" observedRunningTime="2024-12-13 07:32:39.607217778 +0000 UTC m=+57.697072741" watchObservedRunningTime="2024-12-13 07:32:39.607488197 +0000 UTC m=+57.697343169" Dec 13 07:32:39.646000 audit[3979]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=3979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:39.646000 audit[3979]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffde791ba50 a2=0 a3=7ffde791ba3c items=0 ppid=2260 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:39.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:39.654000 audit[3979]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=3979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:39.654000 audit[3979]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffde791ba50 a2=0 a3=7ffde791ba3c items=0 ppid=2260 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:39.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:39.677000 audit[3982]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:39.677000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd9491c520 a2=0 a3=7ffd9491c50c items=0 ppid=2260 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:39.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:39.684000 audit[3982]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:39.684000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd9491c520 a2=0 a3=7ffd9491c50c items=0 ppid=2260 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:39.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:40.358993 systemd[1]: run-containerd-runc-k8s.io-89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac-runc.ihEsYL.mount: Deactivated successfully. Dec 13 07:32:40.383000 audit[3921]: AVC avc: denied { watch } for pid=3921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1984988690/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c156,c465 tclass=file permissive=0 Dec 13 07:32:40.383000 audit[3921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010fd820 a2=fc6 a3=0 items=0 ppid=3501 pid=3921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 key=(null) Dec 13 07:32:40.383000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:32:40.709000 audit[4007]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:40.709000 audit[4007]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffa0003af0 a2=0 a3=7fffa0003adc items=0 ppid=2260 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:40.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:40.715000 audit[4007]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:40.715000 audit[4007]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffa0003af0 a2=0 a3=7fffa0003adc items=0 ppid=2260 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:40.715000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:40.864000 audit[3959]: AVC avc: denied { watch } for pid=3959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1656460445/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c713 tclass=file permissive=0 Dec 13 07:32:40.864000 audit[3959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00015aa00 a2=fc6 a3=0 items=0 ppid=3765 pid=3959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 key=(null) Dec 13 07:32:40.864000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:32:41.731000 audit[4017]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:41.735888 kernel: kauditd_printk_skb: 164 callbacks suppressed Dec 13 07:32:41.736227 kernel: audit: type=1325 audit(1734075161.731:1266): table=filter:114 family=2 entries=8 op=nft_register_rule pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:41.731000 audit[4017]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffaec0f0c0 a2=0 a3=7fffaec0f0ac items=0 ppid=2260 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:41.759732 kernel: audit: type=1300 audit(1734075161.731:1266): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffaec0f0c0 a2=0 a3=7fffaec0f0ac items=0 ppid=2260 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:41.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:41.759000 audit[4017]: NETFILTER_CFG table=nat:115 family=2 entries=34 op=nft_register_chain pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:41.767307 kernel: audit: type=1327 audit(1734075161.731:1266): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:41.767412 kernel: audit: type=1325 audit(1734075161.759:1267): table=nat:115 family=2 entries=34 op=nft_register_chain pid=4017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:32:41.767482 kernel: audit: type=1300 audit(1734075161.759:1267): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffaec0f0c0 a2=0 a3=7fffaec0f0ac items=0 ppid=2260 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:41.759000 audit[4017]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffaec0f0c0 a2=0 a3=7fffaec0f0ac items=0 ppid=2260 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:41.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:41.778875 kernel: audit: type=1327 audit(1734075161.759:1267): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:32:42.184859 env[1198]: time="2024-12-13T07:32:42.184800114Z" level=info msg="StopPodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\"" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.382 [WARNING][4031] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"032a4e98-b393-40cf-814f-27eb5e70c7cb", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a", Pod:"calico-apiserver-5578c47b89-qftcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6f86a00d1ff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.384 [INFO][4031] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.384 [INFO][4031] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" iface="eth0" netns="" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.384 [INFO][4031] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.384 [INFO][4031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.460 [INFO][4039] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.460 [INFO][4039] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.460 [INFO][4039] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.471 [WARNING][4039] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.471 [INFO][4039] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.473 [INFO][4039] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:42.478740 env[1198]: 2024-12-13 07:32:42.475 [INFO][4031] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.481501 env[1198]: time="2024-12-13T07:32:42.480294649Z" level=info msg="TearDown network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" successfully" Dec 13 07:32:42.481501 env[1198]: time="2024-12-13T07:32:42.480339788Z" level=info msg="StopPodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" returns successfully" Dec 13 07:32:42.487170 env[1198]: time="2024-12-13T07:32:42.487117039Z" level=info msg="RemovePodSandbox for \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\"" Dec 13 07:32:42.487269 env[1198]: time="2024-12-13T07:32:42.487182312Z" level=info msg="Forcibly stopping sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\"" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.573 [WARNING][4057] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"032a4e98-b393-40cf-814f-27eb5e70c7cb", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"435ea1fa9c1b2e9f05009d8f5ecfc327a4949a1b3e98270b12bbe6bf8f9faf3a", Pod:"calico-apiserver-5578c47b89-qftcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6f86a00d1ff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.573 [INFO][4057] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.574 [INFO][4057] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" iface="eth0" netns="" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.574 [INFO][4057] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.574 [INFO][4057] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.631 [INFO][4064] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.632 [INFO][4064] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.632 [INFO][4064] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.645 [WARNING][4064] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.645 [INFO][4064] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" HandleID="k8s-pod-network.87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--qftcv-eth0" Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.660 [INFO][4064] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:42.669809 env[1198]: 2024-12-13 07:32:42.667 [INFO][4057] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8" Dec 13 07:32:42.669809 env[1198]: time="2024-12-13T07:32:42.669669073Z" level=info msg="TearDown network for sandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" successfully" Dec 13 07:32:42.684383 env[1198]: time="2024-12-13T07:32:42.684290421Z" level=info msg="RemovePodSandbox \"87b04089ec88ef912f24f3dd9a91adafedf6809f851c47c5a2a7c1944de526d8\" returns successfully" Dec 13 07:32:42.686666 env[1198]: time="2024-12-13T07:32:42.686589286Z" level=info msg="StopPodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\"" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.796 [WARNING][4083] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"9516a2ff-3e68-4f87-82e0-4c53ce709c36", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b", Pod:"coredns-7db6d8ff4d-b2m79", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8d519e966b2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.796 [INFO][4083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.796 [INFO][4083] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" iface="eth0" netns="" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.796 [INFO][4083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.796 [INFO][4083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.844 [INFO][4089] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.845 [INFO][4089] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.845 [INFO][4089] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.856 [WARNING][4089] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.856 [INFO][4089] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.859 [INFO][4089] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:42.862572 env[1198]: 2024-12-13 07:32:42.860 [INFO][4083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:42.863988 env[1198]: time="2024-12-13T07:32:42.863676210Z" level=info msg="TearDown network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" successfully" Dec 13 07:32:42.863988 env[1198]: time="2024-12-13T07:32:42.863734330Z" level=info msg="StopPodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" returns successfully" Dec 13 07:32:42.864401 env[1198]: time="2024-12-13T07:32:42.864365858Z" level=info msg="RemovePodSandbox for \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\"" Dec 13 07:32:42.864866 env[1198]: time="2024-12-13T07:32:42.864813074Z" level=info msg="Forcibly stopping sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\"" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.946 [WARNING][4109] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"9516a2ff-3e68-4f87-82e0-4c53ce709c36", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"ebac1177fbb6484e94df8150857067eff5e696c6132f7cec8411d73c84a2c58b", Pod:"coredns-7db6d8ff4d-b2m79", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8d519e966b2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.947 [INFO][4109] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.947 [INFO][4109] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" iface="eth0" netns="" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.947 [INFO][4109] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.947 [INFO][4109] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.998 [INFO][4115] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.998 [INFO][4115] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:42.998 [INFO][4115] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:43.006 [WARNING][4115] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:43.006 [INFO][4115] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" HandleID="k8s-pod-network.1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--b2m79-eth0" Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:43.008 [INFO][4115] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:43.011741 env[1198]: 2024-12-13 07:32:43.010 [INFO][4109] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b" Dec 13 07:32:43.012824 env[1198]: time="2024-12-13T07:32:43.012756144Z" level=info msg="TearDown network for sandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" successfully" Dec 13 07:32:43.016932 env[1198]: time="2024-12-13T07:32:43.016864486Z" level=info msg="RemovePodSandbox \"1544b0f81a6ebfac40d0a50ed2d32a6bffb4e06a9c0d1b86aa7cd0a53a6e2a3b\" returns successfully" Dec 13 07:32:43.017914 env[1198]: time="2024-12-13T07:32:43.017860724Z" level=info msg="StopPodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\"" Dec 13 07:32:43.051000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:43.051000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:43.066639 kernel: audit: type=1400 audit(1734075163.051:1269): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:43.066749 kernel: audit: type=1400 audit(1734075163.051:1268): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:43.066853 kernel: audit: type=1300 audit(1734075163.051:1268): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00322cfe0 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:43.051000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00322cfe0 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:43.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:43.082166 kernel: audit: type=1327 audit(1734075163.051:1268): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:43.051000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003293b60 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:43.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:43.060000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:43.060000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00322d180 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:43.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:43.060000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:32:43.060000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00322d1a0 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:32:43.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.088 [WARNING][4135] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"5fc826e7-bbe0-48ce-8c53-3b2740eaea10", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4", Pod:"calico-apiserver-5578c47b89-7z6q5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf55a95ca2d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.088 [INFO][4135] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.088 [INFO][4135] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" iface="eth0" netns="" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.088 [INFO][4135] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.088 [INFO][4135] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.119 [INFO][4141] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.120 [INFO][4141] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.120 [INFO][4141] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.130 [WARNING][4141] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.130 [INFO][4141] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.132 [INFO][4141] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:43.136946 env[1198]: 2024-12-13 07:32:43.134 [INFO][4135] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.139930 env[1198]: time="2024-12-13T07:32:43.136895430Z" level=info msg="TearDown network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" successfully" Dec 13 07:32:43.140086 env[1198]: time="2024-12-13T07:32:43.140052173Z" level=info msg="StopPodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" returns successfully" Dec 13 07:32:43.143467 env[1198]: time="2024-12-13T07:32:43.143420686Z" level=info msg="RemovePodSandbox for \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\"" Dec 13 07:32:43.143707 env[1198]: time="2024-12-13T07:32:43.143648216Z" level=info msg="Forcibly stopping sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\"" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.194 [WARNING][4160] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0", GenerateName:"calico-apiserver-5578c47b89-", Namespace:"calico-apiserver", SelfLink:"", UID:"5fc826e7-bbe0-48ce-8c53-3b2740eaea10", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5578c47b89", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"c8ddb05bcdca7aa6ed3ac8d75bab417e5aa1c56f7b8509719990ddc6390156d4", Pod:"calico-apiserver-5578c47b89-7z6q5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.68.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf55a95ca2d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.195 [INFO][4160] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.195 [INFO][4160] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" iface="eth0" netns="" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.195 [INFO][4160] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.195 [INFO][4160] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.228 [INFO][4167] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.228 [INFO][4167] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.229 [INFO][4167] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.241 [WARNING][4167] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.241 [INFO][4167] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" HandleID="k8s-pod-network.ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--apiserver--5578c47b89--7z6q5-eth0" Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.243 [INFO][4167] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:43.248065 env[1198]: 2024-12-13 07:32:43.246 [INFO][4160] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8" Dec 13 07:32:43.249490 env[1198]: time="2024-12-13T07:32:43.249413409Z" level=info msg="TearDown network for sandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" successfully" Dec 13 07:32:43.254999 env[1198]: time="2024-12-13T07:32:43.254947199Z" level=info msg="RemovePodSandbox \"ea89a5f4a8d714fa95e48e2286dc16ee402c0cb89373f62d58d5b856eed440a8\" returns successfully" Dec 13 07:32:43.255987 env[1198]: time="2024-12-13T07:32:43.255950882Z" level=info msg="StopPodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\"" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.321 [WARNING][4187] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0e75987e-db11-4ff0-9145-fdc18a5e98e0", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0", Pod:"coredns-7db6d8ff4d-4rm8p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia75792ce300", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.322 [INFO][4187] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.322 [INFO][4187] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" iface="eth0" netns="" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.322 [INFO][4187] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.322 [INFO][4187] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.352 [INFO][4194] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.353 [INFO][4194] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.353 [INFO][4194] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.363 [WARNING][4194] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.363 [INFO][4194] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.365 [INFO][4194] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:43.369557 env[1198]: 2024-12-13 07:32:43.367 [INFO][4187] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.371977 env[1198]: time="2024-12-13T07:32:43.369579169Z" level=info msg="TearDown network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" successfully" Dec 13 07:32:43.371977 env[1198]: time="2024-12-13T07:32:43.369633869Z" level=info msg="StopPodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" returns successfully" Dec 13 07:32:43.371977 env[1198]: time="2024-12-13T07:32:43.370379310Z" level=info msg="RemovePodSandbox for \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\"" Dec 13 07:32:43.371977 env[1198]: time="2024-12-13T07:32:43.370415066Z" level=info msg="Forcibly stopping sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\"" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.433 [WARNING][4214] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0e75987e-db11-4ff0-9145-fdc18a5e98e0", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"a3ed37d2df1d9eb3a974061d0acf3cf6ba45bc6db6aa89e4dca633b195a3c0e0", Pod:"coredns-7db6d8ff4d-4rm8p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.68.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia75792ce300", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.433 [INFO][4214] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.433 [INFO][4214] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" iface="eth0" netns="" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.433 [INFO][4214] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.433 [INFO][4214] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.480 [INFO][4221] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.480 [INFO][4221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.480 [INFO][4221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.490 [WARNING][4221] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.490 [INFO][4221] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" HandleID="k8s-pod-network.d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Workload="srv--9sek4.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--4rm8p-eth0" Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.493 [INFO][4221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:43.497588 env[1198]: 2024-12-13 07:32:43.495 [INFO][4214] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a" Dec 13 07:32:43.498599 env[1198]: time="2024-12-13T07:32:43.498539252Z" level=info msg="TearDown network for sandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" successfully" Dec 13 07:32:43.505000 env[1198]: time="2024-12-13T07:32:43.504961777Z" level=info msg="RemovePodSandbox \"d645a50b2f79ae1c77ee6a7ab0129a189997e359cde2db39905761b7396f4b1a\" returns successfully" Dec 13 07:32:44.231942 env[1198]: time="2024-12-13T07:32:44.231850821Z" level=info msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" Dec 13 07:32:44.234183 env[1198]: time="2024-12-13T07:32:44.234149604Z" level=info msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.437 [INFO][4261] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.438 [INFO][4261] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" iface="eth0" netns="/var/run/netns/cni-38c1c4a4-ba1c-271b-58c1-c695e346d6f4" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.438 [INFO][4261] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" iface="eth0" netns="/var/run/netns/cni-38c1c4a4-ba1c-271b-58c1-c695e346d6f4" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.439 [INFO][4261] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" iface="eth0" netns="/var/run/netns/cni-38c1c4a4-ba1c-271b-58c1-c695e346d6f4" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.439 [INFO][4261] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.439 [INFO][4261] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.511 [INFO][4268] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.511 [INFO][4268] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.512 [INFO][4268] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.524 [WARNING][4268] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.524 [INFO][4268] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.527 [INFO][4268] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:44.546516 env[1198]: 2024-12-13 07:32:44.544 [INFO][4261] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:32:44.550972 systemd[1]: run-netns-cni\x2d38c1c4a4\x2dba1c\x2d271b\x2d58c1\x2dc695e346d6f4.mount: Deactivated successfully. Dec 13 07:32:44.554326 env[1198]: time="2024-12-13T07:32:44.554268367Z" level=info msg="TearDown network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" successfully" Dec 13 07:32:44.554496 env[1198]: time="2024-12-13T07:32:44.554450058Z" level=info msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" returns successfully" Dec 13 07:32:44.555650 env[1198]: time="2024-12-13T07:32:44.555606591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ljtmb,Uid:afff8102-04e9-47a8-bb52-63e679231697,Namespace:calico-system,Attempt:1,}" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.446 [INFO][4252] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.446 [INFO][4252] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" iface="eth0" netns="/var/run/netns/cni-31ee9b1e-f369-3909-f0bf-a7afcae254f6" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.446 [INFO][4252] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" iface="eth0" netns="/var/run/netns/cni-31ee9b1e-f369-3909-f0bf-a7afcae254f6" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.447 [INFO][4252] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" iface="eth0" netns="/var/run/netns/cni-31ee9b1e-f369-3909-f0bf-a7afcae254f6" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.447 [INFO][4252] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.447 [INFO][4252] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.559 [INFO][4272] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.561 [INFO][4272] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.562 [INFO][4272] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.589 [WARNING][4272] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.589 [INFO][4272] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.595 [INFO][4272] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:44.599255 env[1198]: 2024-12-13 07:32:44.597 [INFO][4252] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:32:44.603746 systemd[1]: run-netns-cni\x2d31ee9b1e\x2df369\x2d3909\x2df0bf\x2da7afcae254f6.mount: Deactivated successfully. Dec 13 07:32:44.604734 env[1198]: time="2024-12-13T07:32:44.604671320Z" level=info msg="TearDown network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" successfully" Dec 13 07:32:44.605219 env[1198]: time="2024-12-13T07:32:44.605186512Z" level=info msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" returns successfully" Dec 13 07:32:44.606444 env[1198]: time="2024-12-13T07:32:44.606408628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d86d7ddd6-xn2hh,Uid:bfb2182b-964d-4b8e-bb23-da5eae62ebaf,Namespace:calico-system,Attempt:1,}" Dec 13 07:32:44.875312 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 07:32:44.875609 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali19c4e64980b: link becomes ready Dec 13 07:32:44.878096 systemd-networkd[1021]: cali19c4e64980b: Link UP Dec 13 07:32:44.878579 systemd-networkd[1021]: cali19c4e64980b: Gained carrier Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.680 [INFO][4281] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0 csi-node-driver- calico-system afff8102-04e9-47a8-bb52-63e679231697 900 0 2024-12-13 07:32:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-9sek4.gb1.brightbox.com csi-node-driver-ljtmb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali19c4e64980b [] []}} ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.681 [INFO][4281] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.771 [INFO][4303] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" HandleID="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.796 [INFO][4303] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" HandleID="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00040aa40), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-9sek4.gb1.brightbox.com", "pod":"csi-node-driver-ljtmb", "timestamp":"2024-12-13 07:32:44.771833059 +0000 UTC"}, Hostname:"srv-9sek4.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.796 [INFO][4303] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.796 [INFO][4303] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.796 [INFO][4303] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-9sek4.gb1.brightbox.com' Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.806 [INFO][4303] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.818 [INFO][4303] ipam/ipam.go 372: Looking up existing affinities for host host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.825 [INFO][4303] ipam/ipam.go 489: Trying affinity for 192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.833 [INFO][4303] ipam/ipam.go 155: Attempting to load block cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.840 [INFO][4303] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.840 [INFO][4303] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.68.128/26 handle="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.843 [INFO][4303] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.852 [INFO][4303] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.68.128/26 handle="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.860 [INFO][4303] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.68.133/26] block=192.168.68.128/26 handle="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.860 [INFO][4303] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.68.133/26] handle="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.861 [INFO][4303] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:44.910166 env[1198]: 2024-12-13 07:32:44.861 [INFO][4303] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.68.133/26] IPv6=[] ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" HandleID="k8s-pod-network.ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.912404 env[1198]: 2024-12-13 07:32:44.863 [INFO][4281] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afff8102-04e9-47a8-bb52-63e679231697", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-ljtmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.68.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali19c4e64980b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:44.912404 env[1198]: 2024-12-13 07:32:44.863 [INFO][4281] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.68.133/32] ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.912404 env[1198]: 2024-12-13 07:32:44.863 [INFO][4281] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali19c4e64980b ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.912404 env[1198]: 2024-12-13 07:32:44.880 [INFO][4281] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.912404 env[1198]: 2024-12-13 07:32:44.881 [INFO][4281] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afff8102-04e9-47a8-bb52-63e679231697", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b", Pod:"csi-node-driver-ljtmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.68.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali19c4e64980b", MAC:"1a:c9:b9:f0:e8:4e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:44.912404 env[1198]: 2024-12-13 07:32:44.901 [INFO][4281] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b" Namespace="calico-system" Pod="csi-node-driver-ljtmb" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:32:44.969226 systemd-networkd[1021]: califef3af7d494: Link UP Dec 13 07:32:44.978096 env[1198]: time="2024-12-13T07:32:44.977144464Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:44.978096 env[1198]: time="2024-12-13T07:32:44.977296409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:44.978096 env[1198]: time="2024-12-13T07:32:44.977578439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:44.978096 env[1198]: time="2024-12-13T07:32:44.978038153Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b pid=4339 runtime=io.containerd.runc.v2 Dec 13 07:32:44.981965 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califef3af7d494: link becomes ready Dec 13 07:32:44.980980 systemd-networkd[1021]: califef3af7d494: Gained carrier Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.726 [INFO][4291] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0 calico-kube-controllers-7d86d7ddd6- calico-system bfb2182b-964d-4b8e-bb23-da5eae62ebaf 901 0 2024-12-13 07:32:03 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7d86d7ddd6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-9sek4.gb1.brightbox.com calico-kube-controllers-7d86d7ddd6-xn2hh eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califef3af7d494 [] []}} ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.726 [INFO][4291] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.804 [INFO][4309] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" HandleID="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.840 [INFO][4309] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" HandleID="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310ab0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-9sek4.gb1.brightbox.com", "pod":"calico-kube-controllers-7d86d7ddd6-xn2hh", "timestamp":"2024-12-13 07:32:44.804530938 +0000 UTC"}, Hostname:"srv-9sek4.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.841 [INFO][4309] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.861 [INFO][4309] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.861 [INFO][4309] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-9sek4.gb1.brightbox.com' Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.883 [INFO][4309] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.893 [INFO][4309] ipam/ipam.go 372: Looking up existing affinities for host host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.914 [INFO][4309] ipam/ipam.go 489: Trying affinity for 192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.923 [INFO][4309] ipam/ipam.go 155: Attempting to load block cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.927 [INFO][4309] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.68.128/26 host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.927 [INFO][4309] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.68.128/26 handle="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.934 [INFO][4309] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.951 [INFO][4309] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.68.128/26 handle="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.961 [INFO][4309] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.68.134/26] block=192.168.68.128/26 handle="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.961 [INFO][4309] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.68.134/26] handle="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" host="srv-9sek4.gb1.brightbox.com" Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.961 [INFO][4309] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:32:45.010030 env[1198]: 2024-12-13 07:32:44.961 [INFO][4309] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.68.134/26] IPv6=[] ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" HandleID="k8s-pod-network.98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.011294 env[1198]: 2024-12-13 07:32:44.965 [INFO][4291] cni-plugin/k8s.go 386: Populated endpoint ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0", GenerateName:"calico-kube-controllers-7d86d7ddd6-", Namespace:"calico-system", SelfLink:"", UID:"bfb2182b-964d-4b8e-bb23-da5eae62ebaf", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d86d7ddd6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-7d86d7ddd6-xn2hh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.68.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califef3af7d494", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:45.011294 env[1198]: 2024-12-13 07:32:44.965 [INFO][4291] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.68.134/32] ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.011294 env[1198]: 2024-12-13 07:32:44.965 [INFO][4291] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califef3af7d494 ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.011294 env[1198]: 2024-12-13 07:32:44.985 [INFO][4291] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.011294 env[1198]: 2024-12-13 07:32:44.986 [INFO][4291] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0", GenerateName:"calico-kube-controllers-7d86d7ddd6-", Namespace:"calico-system", SelfLink:"", UID:"bfb2182b-964d-4b8e-bb23-da5eae62ebaf", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d86d7ddd6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a", Pod:"calico-kube-controllers-7d86d7ddd6-xn2hh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.68.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califef3af7d494", MAC:"0e:41:80:87:25:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:32:45.011294 env[1198]: 2024-12-13 07:32:45.007 [INFO][4291] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a" Namespace="calico-system" Pod="calico-kube-controllers-7d86d7ddd6-xn2hh" WorkloadEndpoint="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:32:45.021535 systemd[1]: Started cri-containerd-ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b.scope. Dec 13 07:32:45.043000 audit[4364]: NETFILTER_CFG table=filter:116 family=2 entries=50 op=nft_register_chain pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:45.043000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=23900 a0=3 a1=7ffe876bfa50 a2=0 a3=7ffe876bfa3c items=0 ppid=3222 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.043000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:45.082515 env[1198]: time="2024-12-13T07:32:45.082162285Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 07:32:45.082515 env[1198]: time="2024-12-13T07:32:45.082234461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 07:32:45.082515 env[1198]: time="2024-12-13T07:32:45.082251652Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 07:32:45.084248 env[1198]: time="2024-12-13T07:32:45.083038968Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a pid=4384 runtime=io.containerd.runc.v2 Dec 13 07:32:45.109373 systemd[1]: Started cri-containerd-98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a.scope. Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.119000 audit: BPF prog-id=193 op=LOAD Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4339 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396663326565666164663536393237313739383135386433363136 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4339 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396663326565666164663536393237313739383135386433363136 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit: BPF prog-id=194 op=LOAD Dec 13 07:32:45.121000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d390 items=0 ppid=4339 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396663326565666164663536393237313739383135386433363136 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit: BPF prog-id=195 op=LOAD Dec 13 07:32:45.121000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d3d8 items=0 ppid=4339 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396663326565666164663536393237313739383135386433363136 Dec 13 07:32:45.121000 audit: BPF prog-id=195 op=UNLOAD Dec 13 07:32:45.121000 audit: BPF prog-id=194 op=UNLOAD Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.121000 audit: BPF prog-id=196 op=LOAD Dec 13 07:32:45.121000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015d7e8 items=0 ppid=4339 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396663326565666164663536393237313739383135386433363136 Dec 13 07:32:45.140000 audit[4405]: NETFILTER_CFG table=filter:117 family=2 entries=50 op=nft_register_chain pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 07:32:45.140000 audit[4405]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7fff1c142750 a2=0 a3=7fff1c14273c items=0 ppid=3222 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.140000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 07:32:45.174341 env[1198]: time="2024-12-13T07:32:45.174273604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ljtmb,Uid:afff8102-04e9-47a8-bb52-63e679231697,Namespace:calico-system,Attempt:1,} returns sandbox id \"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b\"" Dec 13 07:32:45.179254 env[1198]: time="2024-12-13T07:32:45.179209816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.200000 audit: BPF prog-id=197 op=LOAD Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4384 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938643761383866393132343765323338393237333965393863633131 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4384 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938643761383866393132343765323338393237333965393863633131 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit: BPF prog-id=198 op=LOAD Dec 13 07:32:45.202000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000313040 items=0 ppid=4384 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938643761383866393132343765323338393237333965393863633131 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.202000 audit: BPF prog-id=199 op=LOAD Dec 13 07:32:45.202000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000313088 items=0 ppid=4384 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938643761383866393132343765323338393237333965393863633131 Dec 13 07:32:45.204000 audit: BPF prog-id=199 op=UNLOAD Dec 13 07:32:45.205000 audit: BPF prog-id=198 op=UNLOAD Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:45.205000 audit: BPF prog-id=200 op=LOAD Dec 13 07:32:45.205000 audit[4393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000313498 items=0 ppid=4384 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:45.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938643761383866393132343765323338393237333965393863633131 Dec 13 07:32:45.254348 env[1198]: time="2024-12-13T07:32:45.254287738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d86d7ddd6-xn2hh,Uid:bfb2182b-964d-4b8e-bb23-da5eae62ebaf,Namespace:calico-system,Attempt:1,} returns sandbox id \"98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a\"" Dec 13 07:32:46.728370 systemd-networkd[1021]: cali19c4e64980b: Gained IPv6LL Dec 13 07:32:46.856588 systemd-networkd[1021]: califef3af7d494: Gained IPv6LL Dec 13 07:32:46.944046 env[1198]: time="2024-12-13T07:32:46.943988136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:46.945731 env[1198]: time="2024-12-13T07:32:46.945553765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:46.947890 env[1198]: time="2024-12-13T07:32:46.947847544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:46.950267 env[1198]: time="2024-12-13T07:32:46.950220696Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:46.951067 env[1198]: time="2024-12-13T07:32:46.951030613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 07:32:46.958250 env[1198]: time="2024-12-13T07:32:46.958214972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 07:32:47.001734 env[1198]: time="2024-12-13T07:32:47.001667595Z" level=info msg="CreateContainer within sandbox \"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 07:32:47.030641 env[1198]: time="2024-12-13T07:32:47.030574552Z" level=info msg="CreateContainer within sandbox \"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e323076fedf4e25f3cac5ad17038e547cd1605ff1e1537d5e816f63c86cd1899\"" Dec 13 07:32:47.034177 env[1198]: time="2024-12-13T07:32:47.034143181Z" level=info msg="StartContainer for \"e323076fedf4e25f3cac5ad17038e547cd1605ff1e1537d5e816f63c86cd1899\"" Dec 13 07:32:47.098077 systemd[1]: run-containerd-runc-k8s.io-e323076fedf4e25f3cac5ad17038e547cd1605ff1e1537d5e816f63c86cd1899-runc.voskLv.mount: Deactivated successfully. Dec 13 07:32:47.108169 systemd[1]: Started cri-containerd-e323076fedf4e25f3cac5ad17038e547cd1605ff1e1537d5e816f63c86cd1899.scope. Dec 13 07:32:47.183134 kernel: kauditd_printk_skb: 128 callbacks suppressed Dec 13 07:32:47.190871 kernel: audit: type=1400 audit(1734075167.176:1310): avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.190970 kernel: audit: type=1300 audit(1734075167.176:1310): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa8fc584d58 items=0 ppid=4339 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa8fc584d58 items=0 ppid=4339 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:47.202721 kernel: audit: type=1327 audit(1734075167.176:1310): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323330373666656466346532356633636163356164313730333865 Dec 13 07:32:47.202798 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323330373666656466346532356633636163356164313730333865 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.212697 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.213065 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.213125 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.226825 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.236792 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.236867 kernel: audit: type=1400 audit(1734075167.176:1311): avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.176000 audit: BPF prog-id=201 op=LOAD Dec 13 07:32:47.176000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000282ab8 items=0 ppid=4339 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:47.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323330373666656466346532356633636163356164313730333865 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.177000 audit: BPF prog-id=202 op=LOAD Dec 13 07:32:47.177000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000282b08 items=0 ppid=4339 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:47.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323330373666656466346532356633636163356164313730333865 Dec 13 07:32:47.197000 audit: BPF prog-id=202 op=UNLOAD Dec 13 07:32:47.197000 audit: BPF prog-id=201 op=UNLOAD Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:47.197000 audit: BPF prog-id=203 op=LOAD Dec 13 07:32:47.197000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000282b98 items=0 ppid=4339 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:47.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533323330373666656466346532356633636163356164313730333865 Dec 13 07:32:47.253962 env[1198]: time="2024-12-13T07:32:47.253763908Z" level=info msg="StartContainer for \"e323076fedf4e25f3cac5ad17038e547cd1605ff1e1537d5e816f63c86cd1899\" returns successfully" Dec 13 07:32:50.348973 env[1198]: time="2024-12-13T07:32:50.348877050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:50.352543 env[1198]: time="2024-12-13T07:32:50.352496061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:50.355380 env[1198]: time="2024-12-13T07:32:50.355305878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:50.357512 env[1198]: time="2024-12-13T07:32:50.357477895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:50.358587 env[1198]: time="2024-12-13T07:32:50.358534824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 07:32:50.363281 env[1198]: time="2024-12-13T07:32:50.363248423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 07:32:50.443957 env[1198]: time="2024-12-13T07:32:50.443566026Z" level=info msg="CreateContainer within sandbox \"98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 07:32:50.489077 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4120260155.mount: Deactivated successfully. Dec 13 07:32:50.498157 env[1198]: time="2024-12-13T07:32:50.498085090Z" level=info msg="CreateContainer within sandbox \"98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e\"" Dec 13 07:32:50.499392 env[1198]: time="2024-12-13T07:32:50.499345405Z" level=info msg="StartContainer for \"394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e\"" Dec 13 07:32:50.539288 systemd[1]: Started cri-containerd-394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e.scope. Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.612000 audit: BPF prog-id=204 op=LOAD Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4384 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:50.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346137656637323933656233303165386563303166666537303037 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4384 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:50.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346137656637323933656233303165386563303166666537303037 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit: BPF prog-id=205 op=LOAD Dec 13 07:32:50.614000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a9c0 items=0 ppid=4384 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:50.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346137656637323933656233303165386563303166666537303037 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit: BPF prog-id=206 op=LOAD Dec 13 07:32:50.614000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039aa08 items=0 ppid=4384 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:50.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346137656637323933656233303165386563303166666537303037 Dec 13 07:32:50.614000 audit: BPF prog-id=206 op=UNLOAD Dec 13 07:32:50.614000 audit: BPF prog-id=205 op=UNLOAD Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:50.614000 audit: BPF prog-id=207 op=LOAD Dec 13 07:32:50.614000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039ae18 items=0 ppid=4384 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:50.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339346137656637323933656233303165386563303166666537303037 Dec 13 07:32:50.669070 env[1198]: time="2024-12-13T07:32:50.669000087Z" level=info msg="StartContainer for \"394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e\" returns successfully" Dec 13 07:32:51.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.40.198:22-36.155.130.1:48330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:32:51.008269 systemd[1]: Started sshd@13-10.230.40.198:22-36.155.130.1:48330.service. Dec 13 07:32:51.019066 kubelet[2079]: I1213 07:32:51.016431 2079 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7d86d7ddd6-xn2hh" podStartSLOduration=42.896860582 podStartE2EDuration="48.00339205s" podCreationTimestamp="2024-12-13 07:32:03 +0000 UTC" firstStartedPulling="2024-12-13 07:32:45.256085801 +0000 UTC m=+63.345940761" lastFinishedPulling="2024-12-13 07:32:50.362617262 +0000 UTC m=+68.452472229" observedRunningTime="2024-12-13 07:32:50.9801751 +0000 UTC m=+69.070030059" watchObservedRunningTime="2024-12-13 07:32:51.00339205 +0000 UTC m=+69.093247021" Dec 13 07:32:51.819720 systemd[1]: run-containerd-runc-k8s.io-394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e-runc.2rsN03.mount: Deactivated successfully. Dec 13 07:32:52.341595 env[1198]: time="2024-12-13T07:32:52.341529754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:52.345635 env[1198]: time="2024-12-13T07:32:52.345599066Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:52.349159 env[1198]: time="2024-12-13T07:32:52.349116248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:52.352882 env[1198]: time="2024-12-13T07:32:52.352844645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 07:32:52.354724 env[1198]: time="2024-12-13T07:32:52.354649920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 07:32:52.365699 env[1198]: time="2024-12-13T07:32:52.365631011Z" level=info msg="CreateContainer within sandbox \"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 07:32:52.389212 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1326439212.mount: Deactivated successfully. Dec 13 07:32:52.392342 env[1198]: time="2024-12-13T07:32:52.392246181Z" level=info msg="CreateContainer within sandbox \"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"725d59f5192740c40cfc7d95ddf547fc9f1cbb808beb552b76d07ad1d174da7d\"" Dec 13 07:32:52.393233 env[1198]: time="2024-12-13T07:32:52.393044720Z" level=info msg="StartContainer for \"725d59f5192740c40cfc7d95ddf547fc9f1cbb808beb552b76d07ad1d174da7d\"" Dec 13 07:32:52.442536 systemd[1]: run-containerd-runc-k8s.io-725d59f5192740c40cfc7d95ddf547fc9f1cbb808beb552b76d07ad1d174da7d-runc.VC0Asv.mount: Deactivated successfully. Dec 13 07:32:52.453077 systemd[1]: Started cri-containerd-725d59f5192740c40cfc7d95ddf547fc9f1cbb808beb552b76d07ad1d174da7d.scope. Dec 13 07:32:52.544745 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 07:32:52.545076 kernel: audit: type=1400 audit(1734075172.533:1335): avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0e0f045b38 items=0 ppid=4339 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:52.555366 kernel: audit: type=1300 audit(1734075172.533:1335): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0e0f045b38 items=0 ppid=4339 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:52.563826 kernel: audit: type=1327 audit(1734075172.533:1335): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356435396635313932373430633430636663376439356464663534 Dec 13 07:32:52.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356435396635313932373430633430636663376439356464663534 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.576267 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.576368 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.581294 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.586342 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.591342 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.596354 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.601798 kernel: audit: type=1400 audit(1734075172.533:1336): avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.533000 audit: BPF prog-id=208 op=LOAD Dec 13 07:32:52.533000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d5b98 items=0 ppid=4339 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:52.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356435396635313932373430633430636663376439356464663534 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit: BPF prog-id=209 op=LOAD Dec 13 07:32:52.544000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d5be8 items=0 ppid=4339 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:52.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356435396635313932373430633430636663376439356464663534 Dec 13 07:32:52.544000 audit: BPF prog-id=209 op=UNLOAD Dec 13 07:32:52.544000 audit: BPF prog-id=208 op=UNLOAD Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 07:32:52.544000 audit: BPF prog-id=210 op=LOAD Dec 13 07:32:52.544000 audit[4535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d5c78 items=0 ppid=4339 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:32:52.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356435396635313932373430633430636663376439356464663534 Dec 13 07:32:52.622651 env[1198]: time="2024-12-13T07:32:52.622595427Z" level=info msg="StartContainer for \"725d59f5192740c40cfc7d95ddf547fc9f1cbb808beb552b76d07ad1d174da7d\" returns successfully" Dec 13 07:32:53.442387 kubelet[2079]: I1213 07:32:53.440042 2079 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 07:32:53.445119 kubelet[2079]: I1213 07:32:53.445054 2079 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 07:33:09.890293 sshd[4505]: Invalid user NL5xUDpV2xRa from 36.155.130.1 port 48330 Dec 13 07:33:09.908268 sshd[4505]: userauth_pubkey: parse publickey packet: incomplete message [preauth] Dec 13 07:33:09.914380 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 07:33:09.914536 kernel: audit: type=1109 audit(1734075189.906:1341): pid=4505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=36.155.130.1 addr=36.155.130.1 terminal=ssh res=failed' Dec 13 07:33:09.906000 audit[4505]: USER_ERR pid=4505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=36.155.130.1 addr=36.155.130.1 terminal=ssh res=failed' Dec 13 07:33:09.925808 kernel: audit: type=1131 audit(1734075189.917:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.40.198:22-36.155.130.1:48330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:09.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.40.198:22-36.155.130.1:48330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:09.919149 systemd[1]: sshd@13-10.230.40.198:22-36.155.130.1:48330.service: Deactivated successfully. Dec 13 07:33:10.360267 systemd[1]: run-containerd-runc-k8s.io-89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac-runc.raodOZ.mount: Deactivated successfully. Dec 13 07:33:24.330386 systemd[1]: sshd@11-10.230.40.198:22-27.25.130.222:55424.service: Deactivated successfully. Dec 13 07:33:24.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.40.198:22-27.25.130.222:55424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:24.339934 kernel: audit: type=1131 audit(1734075204.330:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.40.198:22-27.25.130.222:55424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:36.477000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:36.487835 kernel: audit: type=1400 audit(1734075216.477:1344): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:36.488344 kernel: audit: type=1400 audit(1734075216.481:1345): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:36.481000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:36.481000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001558e70 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:36.481000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:36.509239 kernel: audit: type=1300 audit(1734075216.481:1345): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001558e70 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:36.509336 kernel: audit: type=1327 audit(1734075216.481:1345): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:36.509401 kernel: audit: type=1300 audit(1734075216.477:1344): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000999a60 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:36.477000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000999a60 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:36.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:36.523796 kernel: audit: type=1327 audit(1734075216.477:1344): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:38.010000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.017799 kernel: audit: type=1400 audit(1734075218.010:1347): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.010000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.010000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a18d7e0 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.035242 kernel: audit: type=1400 audit(1734075218.010:1346): avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.035425 kernel: audit: type=1300 audit(1734075218.010:1346): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a18d7e0 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.035901 kernel: audit: type=1327 audit(1734075218.010:1346): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:38.010000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:38.010000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b3af500 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.010000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:38.011000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.011000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b3af530 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.011000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:38.011000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.011000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c006135e30 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.011000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:38.166000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.166000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a18dc20 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:38.167000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:38.167000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c006135f50 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:33:38.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:33:40.358234 systemd[1]: run-containerd-runc-k8s.io-89b5301323d33349c87f4fdbc4f69f0a8e6414392d9f109493ca96ea7fa496ac-runc.WgWiyU.mount: Deactivated successfully. Dec 13 07:33:40.404000 audit[3921]: AVC avc: denied { watch } for pid=3921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1984988690/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c156,c465 tclass=file permissive=0 Dec 13 07:33:40.404000 audit[3921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002347980 a2=fc6 a3=0 items=0 ppid=3501 pid=3921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 key=(null) Dec 13 07:33:40.404000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:33:40.866000 audit[3959]: AVC avc: denied { watch } for pid=3959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1656460445/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c713 tclass=file permissive=0 Dec 13 07:33:40.866000 audit[3959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aa2500 a2=fc6 a3=0 items=0 ppid=3765 pid=3959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 key=(null) Dec 13 07:33:40.866000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:33:43.063385 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 07:33:43.065035 kernel: audit: type=1400 audit(1734075223.055:1354): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.055000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.055000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3300 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.075807 kernel: audit: type=1300 audit(1734075223.055:1354): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3300 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.084844 kernel: audit: type=1327 audit(1734075223.055:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.063000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.063000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3320 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.099340 kernel: audit: type=1400 audit(1734075223.063:1355): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.099472 kernel: audit: type=1300 audit(1734075223.063:1355): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3320 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.121835 kernel: audit: type=1327 audit(1734075223.063:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.121960 kernel: audit: type=1400 audit(1734075223.063:1356): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.063000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.063000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3340 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.144005 kernel: audit: type=1300 audit(1734075223.063:1356): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3340 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.144168 kernel: audit: type=1327 audit(1734075223.063:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.063000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.152011 kernel: audit: type=1400 audit(1734075223.063:1357): avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:33:43.063000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb3360 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:33:43.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:33:43.520892 env[1198]: time="2024-12-13T07:33:43.519680254Z" level=info msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.790 [WARNING][4690] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afff8102-04e9-47a8-bb52-63e679231697", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b", Pod:"csi-node-driver-ljtmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.68.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali19c4e64980b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.793 [INFO][4690] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.793 [INFO][4690] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" iface="eth0" netns="" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.793 [INFO][4690] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.793 [INFO][4690] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.990 [INFO][4696] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.993 [INFO][4696] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:43.993 [INFO][4696] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:44.009 [WARNING][4696] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:44.010 [INFO][4696] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:44.012 [INFO][4696] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:33:44.016910 env[1198]: 2024-12-13 07:33:44.014 [INFO][4690] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.019131 env[1198]: time="2024-12-13T07:33:44.018120657Z" level=info msg="TearDown network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" successfully" Dec 13 07:33:44.019131 env[1198]: time="2024-12-13T07:33:44.018195113Z" level=info msg="StopPodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" returns successfully" Dec 13 07:33:44.023223 env[1198]: time="2024-12-13T07:33:44.023187870Z" level=info msg="RemovePodSandbox for \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" Dec 13 07:33:44.023583 env[1198]: time="2024-12-13T07:33:44.023464851Z" level=info msg="Forcibly stopping sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\"" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.086 [WARNING][4715] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"afff8102-04e9-47a8-bb52-63e679231697", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"ed9fc2eefadf569271798158d3616e4df8412221afca5b0aeb0f22e4c188a58b", Pod:"csi-node-driver-ljtmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.68.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali19c4e64980b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.086 [INFO][4715] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.086 [INFO][4715] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" iface="eth0" netns="" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.087 [INFO][4715] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.087 [INFO][4715] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.128 [INFO][4721] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.128 [INFO][4721] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.128 [INFO][4721] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.137 [WARNING][4721] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.138 [INFO][4721] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" HandleID="k8s-pod-network.dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Workload="srv--9sek4.gb1.brightbox.com-k8s-csi--node--driver--ljtmb-eth0" Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.139 [INFO][4721] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:33:44.145690 env[1198]: 2024-12-13 07:33:44.142 [INFO][4715] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657" Dec 13 07:33:44.147859 env[1198]: time="2024-12-13T07:33:44.146059216Z" level=info msg="TearDown network for sandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" successfully" Dec 13 07:33:44.153595 env[1198]: time="2024-12-13T07:33:44.153524668Z" level=info msg="RemovePodSandbox \"dfdb7c2a032a87fea73db5dd06190a202a49c4e643131f7bda9d4fb664af3657\" returns successfully" Dec 13 07:33:44.154578 env[1198]: time="2024-12-13T07:33:44.154544641Z" level=info msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.225 [WARNING][4740] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0", GenerateName:"calico-kube-controllers-7d86d7ddd6-", Namespace:"calico-system", SelfLink:"", UID:"bfb2182b-964d-4b8e-bb23-da5eae62ebaf", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d86d7ddd6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a", Pod:"calico-kube-controllers-7d86d7ddd6-xn2hh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.68.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califef3af7d494", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.226 [INFO][4740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.226 [INFO][4740] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" iface="eth0" netns="" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.226 [INFO][4740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.226 [INFO][4740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.266 [INFO][4746] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.266 [INFO][4746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.266 [INFO][4746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.275 [WARNING][4746] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.275 [INFO][4746] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.277 [INFO][4746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:33:44.283106 env[1198]: 2024-12-13 07:33:44.279 [INFO][4740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.287382 env[1198]: time="2024-12-13T07:33:44.284525165Z" level=info msg="TearDown network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" successfully" Dec 13 07:33:44.287382 env[1198]: time="2024-12-13T07:33:44.284586304Z" level=info msg="StopPodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" returns successfully" Dec 13 07:33:44.287382 env[1198]: time="2024-12-13T07:33:44.286532581Z" level=info msg="RemovePodSandbox for \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" Dec 13 07:33:44.287382 env[1198]: time="2024-12-13T07:33:44.286581777Z" level=info msg="Forcibly stopping sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\"" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.340 [WARNING][4765] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0", GenerateName:"calico-kube-controllers-7d86d7ddd6-", Namespace:"calico-system", SelfLink:"", UID:"bfb2182b-964d-4b8e-bb23-da5eae62ebaf", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 7, 32, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d86d7ddd6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-9sek4.gb1.brightbox.com", ContainerID:"98d7a88f91247e23892739e98cc11cd491791327a2c25ac9d7de92a5a0589d2a", Pod:"calico-kube-controllers-7d86d7ddd6-xn2hh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.68.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califef3af7d494", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.341 [INFO][4765] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.341 [INFO][4765] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" iface="eth0" netns="" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.341 [INFO][4765] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.341 [INFO][4765] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.373 [INFO][4771] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.373 [INFO][4771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.374 [INFO][4771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.385 [WARNING][4771] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.385 [INFO][4771] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" HandleID="k8s-pod-network.a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Workload="srv--9sek4.gb1.brightbox.com-k8s-calico--kube--controllers--7d86d7ddd6--xn2hh-eth0" Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.387 [INFO][4771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 07:33:44.392403 env[1198]: 2024-12-13 07:33:44.389 [INFO][4765] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e" Dec 13 07:33:44.393652 env[1198]: time="2024-12-13T07:33:44.392466337Z" level=info msg="TearDown network for sandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" successfully" Dec 13 07:33:44.396940 env[1198]: time="2024-12-13T07:33:44.396895004Z" level=info msg="RemovePodSandbox \"a6679db7263119f9a6e22f1ef63908d7bf4a3cd0703dcef5ed9e298a9048497e\" returns successfully" Dec 13 07:33:47.946431 systemd[1]: Started sshd@14-10.230.40.198:22-139.178.89.65:60034.service. Dec 13 07:33:47.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.40.198:22-139.178.89.65:60034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:48.905000 audit[4783]: USER_ACCT pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.909988 sshd[4783]: Accepted publickey for core from 139.178.89.65 port 60034 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:33:48.910958 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 07:33:48.911064 kernel: audit: type=1101 audit(1734075228.905:1359): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.917000 audit[4783]: CRED_ACQ pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.921112 sshd[4783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:33:48.924902 kernel: audit: type=1103 audit(1734075228.917:1360): pid=4783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.917000 audit[4783]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc76e8e390 a2=3 a3=0 items=0 ppid=1 pid=4783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:33:48.936883 kernel: audit: type=1006 audit(1734075228.917:1361): pid=4783 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 07:33:48.937327 kernel: audit: type=1300 audit(1734075228.917:1361): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc76e8e390 a2=3 a3=0 items=0 ppid=1 pid=4783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:33:48.938502 kernel: audit: type=1327 audit(1734075228.917:1361): proctitle=737368643A20636F7265205B707269765D Dec 13 07:33:48.917000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:33:48.964121 systemd[1]: Started session-10.scope. Dec 13 07:33:48.964878 systemd-logind[1185]: New session 10 of user core. Dec 13 07:33:48.977000 audit[4783]: USER_START pid=4783 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.985881 kernel: audit: type=1105 audit(1734075228.977:1362): pid=4783 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.987000 audit[4785]: CRED_ACQ pid=4785 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:48.994888 kernel: audit: type=1103 audit(1734075228.987:1363): pid=4785 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:49.387020 systemd[1]: run-containerd-runc-k8s.io-394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e-runc.P01Eo6.mount: Deactivated successfully. Dec 13 07:33:50.091339 sshd[4783]: pam_unix(sshd:session): session closed for user core Dec 13 07:33:50.092000 audit[4783]: USER_END pid=4783 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:50.100765 systemd[1]: sshd@14-10.230.40.198:22-139.178.89.65:60034.service: Deactivated successfully. Dec 13 07:33:50.102316 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 07:33:50.105857 kernel: audit: type=1106 audit(1734075230.092:1364): pid=4783 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:50.092000 audit[4783]: CRED_DISP pid=4783 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:50.112863 kernel: audit: type=1104 audit(1734075230.092:1365): pid=4783 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:50.114131 systemd-logind[1185]: Session 10 logged out. Waiting for processes to exit. Dec 13 07:33:50.116525 systemd-logind[1185]: Removed session 10. Dec 13 07:33:50.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.40.198:22-139.178.89.65:60034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:50.123850 kernel: audit: type=1131 audit(1734075230.093:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.40.198:22-139.178.89.65:60034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:54.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.40.198:22-36.155.130.1:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:54.391741 systemd[1]: sshd@12-10.230.40.198:22-36.155.130.1:52454.service: Deactivated successfully. Dec 13 07:33:54.401835 kernel: audit: type=1131 audit(1734075234.391:1367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.40.198:22-36.155.130.1:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:55.243301 systemd[1]: Started sshd@15-10.230.40.198:22-139.178.89.65:36188.service. Dec 13 07:33:55.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.40.198:22-139.178.89.65:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:55.251009 kernel: audit: type=1130 audit(1734075235.244:1368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.40.198:22-139.178.89.65:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:56.165000 audit[4819]: USER_ACCT pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.167036 sshd[4819]: Accepted publickey for core from 139.178.89.65 port 36188 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:33:56.172000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.174149 sshd[4819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:33:56.179180 kernel: audit: type=1101 audit(1734075236.165:1369): pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.179302 kernel: audit: type=1103 audit(1734075236.172:1370): pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.184013 kernel: audit: type=1006 audit(1734075236.172:1371): pid=4819 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 07:33:56.185576 kernel: audit: type=1300 audit(1734075236.172:1371): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e402720 a2=3 a3=0 items=0 ppid=1 pid=4819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:33:56.172000 audit[4819]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e402720 a2=3 a3=0 items=0 ppid=1 pid=4819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:33:56.183426 systemd[1]: Started session-11.scope. Dec 13 07:33:56.184512 systemd-logind[1185]: New session 11 of user core. Dec 13 07:33:56.172000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:33:56.192836 kernel: audit: type=1327 audit(1734075236.172:1371): proctitle=737368643A20636F7265205B707269765D Dec 13 07:33:56.195000 audit[4819]: USER_START pid=4819 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.198000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.208613 kernel: audit: type=1105 audit(1734075236.195:1372): pid=4819 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.208745 kernel: audit: type=1103 audit(1734075236.198:1373): pid=4827 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.953015 sshd[4819]: pam_unix(sshd:session): session closed for user core Dec 13 07:33:56.954000 audit[4819]: USER_END pid=4819 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.964831 kernel: audit: type=1106 audit(1734075236.954:1374): pid=4819 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.954000 audit[4819]: CRED_DISP pid=4819 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:33:56.966606 systemd[1]: sshd@15-10.230.40.198:22-139.178.89.65:36188.service: Deactivated successfully. Dec 13 07:33:56.968182 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 07:33:56.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.40.198:22-139.178.89.65:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:33:56.969321 systemd-logind[1185]: Session 11 logged out. Waiting for processes to exit. Dec 13 07:33:56.971586 systemd-logind[1185]: Removed session 11. Dec 13 07:34:02.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.40.198:22-139.178.89.65:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:02.111501 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 07:34:02.111601 kernel: audit: type=1130 audit(1734075242.106:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.40.198:22-139.178.89.65:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:02.106689 systemd[1]: Started sshd@16-10.230.40.198:22-139.178.89.65:38426.service. Dec 13 07:34:03.033000 audit[4840]: USER_ACCT pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.038591 sshd[4840]: Accepted publickey for core from 139.178.89.65 port 38426 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:03.044807 kernel: audit: type=1101 audit(1734075243.033:1378): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.046000 audit[4840]: CRED_ACQ pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.049572 sshd[4840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:03.058146 kernel: audit: type=1103 audit(1734075243.046:1379): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.058268 kernel: audit: type=1006 audit(1734075243.046:1380): pid=4840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 07:34:03.046000 audit[4840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a1f5200 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:03.064904 kernel: audit: type=1300 audit(1734075243.046:1380): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a1f5200 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:03.046000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:03.067685 kernel: audit: type=1327 audit(1734075243.046:1380): proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:03.073804 systemd-logind[1185]: New session 12 of user core. Dec 13 07:34:03.075566 systemd[1]: Started session-12.scope. Dec 13 07:34:03.092495 kernel: audit: type=1105 audit(1734075243.082:1381): pid=4840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.098911 kernel: audit: type=1103 audit(1734075243.092:1382): pid=4842 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.082000 audit[4840]: USER_START pid=4840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.092000 audit[4842]: CRED_ACQ pid=4842 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.757056 sshd[4840]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:03.758000 audit[4840]: USER_END pid=4840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.761713 systemd[1]: sshd@16-10.230.40.198:22-139.178.89.65:38426.service: Deactivated successfully. Dec 13 07:34:03.774916 kernel: audit: type=1106 audit(1734075243.758:1383): pid=4840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.775008 kernel: audit: type=1104 audit(1734075243.758:1384): pid=4840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.758000 audit[4840]: CRED_DISP pid=4840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:03.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.40.198:22-139.178.89.65:38426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:03.763554 systemd-logind[1185]: Session 12 logged out. Waiting for processes to exit. Dec 13 07:34:03.769033 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 07:34:03.771520 systemd-logind[1185]: Removed session 12. Dec 13 07:34:03.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.40.198:22-139.178.89.65:38430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:03.906543 systemd[1]: Started sshd@17-10.230.40.198:22-139.178.89.65:38430.service. Dec 13 07:34:04.807863 sshd[4853]: Accepted publickey for core from 139.178.89.65 port 38430 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:04.806000 audit[4853]: USER_ACCT pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:04.808000 audit[4853]: CRED_ACQ pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:04.809000 audit[4853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d7365b0 a2=3 a3=0 items=0 ppid=1 pid=4853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:04.809000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:04.811343 sshd[4853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:04.819690 systemd[1]: Started session-13.scope. Dec 13 07:34:04.820528 systemd-logind[1185]: New session 13 of user core. Dec 13 07:34:04.827000 audit[4853]: USER_START pid=4853 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:04.830000 audit[4856]: CRED_ACQ pid=4856 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:05.638943 sshd[4853]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:05.641000 audit[4853]: USER_END pid=4853 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:05.642000 audit[4853]: CRED_DISP pid=4853 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:05.645357 systemd[1]: sshd@17-10.230.40.198:22-139.178.89.65:38430.service: Deactivated successfully. Dec 13 07:34:05.646497 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 07:34:05.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.40.198:22-139.178.89.65:38430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:05.647438 systemd-logind[1185]: Session 13 logged out. Waiting for processes to exit. Dec 13 07:34:05.648967 systemd-logind[1185]: Removed session 13. Dec 13 07:34:05.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.40.198:22-139.178.89.65:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:05.784071 systemd[1]: Started sshd@18-10.230.40.198:22-139.178.89.65:38438.service. Dec 13 07:34:06.702000 audit[4866]: USER_ACCT pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:06.704511 sshd[4866]: Accepted publickey for core from 139.178.89.65 port 38438 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:06.706000 audit[4866]: CRED_ACQ pid=4866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:06.706000 audit[4866]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64bcf870 a2=3 a3=0 items=0 ppid=1 pid=4866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:06.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:06.708101 sshd[4866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:06.715660 systemd-logind[1185]: New session 14 of user core. Dec 13 07:34:06.716500 systemd[1]: Started session-14.scope. Dec 13 07:34:06.725000 audit[4866]: USER_START pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:06.728000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:07.429406 sshd[4866]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:07.431000 audit[4866]: USER_END pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:07.436414 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 07:34:07.436536 kernel: audit: type=1106 audit(1734075247.431:1401): pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:07.431000 audit[4866]: CRED_DISP pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:07.444194 systemd[1]: sshd@18-10.230.40.198:22-139.178.89.65:38438.service: Deactivated successfully. Dec 13 07:34:07.445617 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 07:34:07.450791 kernel: audit: type=1104 audit(1734075247.431:1402): pid=4866 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:07.451665 systemd-logind[1185]: Session 14 logged out. Waiting for processes to exit. Dec 13 07:34:07.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.40.198:22-139.178.89.65:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:07.459800 kernel: audit: type=1131 audit(1734075247.443:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.40.198:22-139.178.89.65:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:07.460104 systemd-logind[1185]: Removed session 14. Dec 13 07:34:12.579183 systemd[1]: Started sshd@19-10.230.40.198:22-139.178.89.65:51904.service. Dec 13 07:34:12.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.40.198:22-139.178.89.65:51904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:12.592441 kernel: audit: type=1130 audit(1734075252.578:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.40.198:22-139.178.89.65:51904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:13.527000 audit[4921]: USER_ACCT pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.531495 sshd[4921]: Accepted publickey for core from 139.178.89.65 port 51904 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:13.535931 kernel: audit: type=1101 audit(1734075253.527:1405): pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.536041 kernel: audit: type=1103 audit(1734075253.534:1406): pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.534000 audit[4921]: CRED_ACQ pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.537072 sshd[4921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:13.545720 kernel: audit: type=1006 audit(1734075253.534:1407): pid=4921 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 07:34:13.534000 audit[4921]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffd68f4d0 a2=3 a3=0 items=0 ppid=1 pid=4921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:13.534000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:13.554709 kernel: audit: type=1300 audit(1734075253.534:1407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffd68f4d0 a2=3 a3=0 items=0 ppid=1 pid=4921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:13.554828 kernel: audit: type=1327 audit(1734075253.534:1407): proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:13.557697 systemd-logind[1185]: New session 15 of user core. Dec 13 07:34:13.558767 systemd[1]: Started session-15.scope. Dec 13 07:34:13.568000 audit[4921]: USER_START pid=4921 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.568000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.595447 kernel: audit: type=1105 audit(1734075253.568:1408): pid=4921 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:13.595590 kernel: audit: type=1103 audit(1734075253.568:1409): pid=4923 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:14.306903 sshd[4921]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:14.307000 audit[4921]: USER_END pid=4921 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:14.319819 kernel: audit: type=1106 audit(1734075254.307:1410): pid=4921 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:14.319922 systemd[1]: sshd@19-10.230.40.198:22-139.178.89.65:51904.service: Deactivated successfully. Dec 13 07:34:14.321357 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 07:34:14.307000 audit[4921]: CRED_DISP pid=4921 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:14.327795 kernel: audit: type=1104 audit(1734075254.307:1411): pid=4921 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:14.328150 systemd-logind[1185]: Session 15 logged out. Waiting for processes to exit. Dec 13 07:34:14.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.40.198:22-139.178.89.65:51904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:14.329718 systemd-logind[1185]: Removed session 15. Dec 13 07:34:19.382394 systemd[1]: run-containerd-runc-k8s.io-394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e-runc.AolDmG.mount: Deactivated successfully. Dec 13 07:34:19.453032 systemd[1]: Started sshd@20-10.230.40.198:22-139.178.89.65:42368.service. Dec 13 07:34:19.464136 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 07:34:19.464287 kernel: audit: type=1130 audit(1734075259.452:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.40.198:22-139.178.89.65:42368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:19.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.40.198:22-139.178.89.65:42368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:20.374000 audit[4950]: USER_ACCT pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.376264 sshd[4950]: Accepted publickey for core from 139.178.89.65 port 42368 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:20.382813 kernel: audit: type=1101 audit(1734075260.374:1414): pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.383000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.393882 sshd[4950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:20.397567 kernel: audit: type=1103 audit(1734075260.383:1415): pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.397672 kernel: audit: type=1006 audit(1734075260.383:1416): pid=4950 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 07:34:20.383000 audit[4950]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2082f40 a2=3 a3=0 items=0 ppid=1 pid=4950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:20.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:20.407181 kernel: audit: type=1300 audit(1734075260.383:1416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2082f40 a2=3 a3=0 items=0 ppid=1 pid=4950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:20.407298 kernel: audit: type=1327 audit(1734075260.383:1416): proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:20.415093 systemd[1]: Started session-16.scope. Dec 13 07:34:20.415666 systemd-logind[1185]: New session 16 of user core. Dec 13 07:34:20.422000 audit[4950]: USER_START pid=4950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.425000 audit[4952]: CRED_ACQ pid=4952 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.437241 kernel: audit: type=1105 audit(1734075260.422:1417): pid=4950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:20.437379 kernel: audit: type=1103 audit(1734075260.425:1418): pid=4952 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:21.169574 sshd[4950]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:21.170000 audit[4950]: USER_END pid=4950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:21.174681 systemd[1]: sshd@20-10.230.40.198:22-139.178.89.65:42368.service: Deactivated successfully. Dec 13 07:34:21.175830 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 07:34:21.180264 kernel: audit: type=1106 audit(1734075261.170:1419): pid=4950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:21.180926 kernel: audit: type=1104 audit(1734075261.171:1420): pid=4950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:21.171000 audit[4950]: CRED_DISP pid=4950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:21.179738 systemd-logind[1185]: Session 16 logged out. Waiting for processes to exit. Dec 13 07:34:21.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.40.198:22-139.178.89.65:42368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:21.187065 systemd-logind[1185]: Removed session 16. Dec 13 07:34:26.317880 systemd[1]: Started sshd@21-10.230.40.198:22-139.178.89.65:42380.service. Dec 13 07:34:26.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.40.198:22-139.178.89.65:42380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:26.324084 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 07:34:26.324171 kernel: audit: type=1130 audit(1734075266.319:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.40.198:22-139.178.89.65:42380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:27.226000 audit[4963]: USER_ACCT pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.227538 sshd[4963]: Accepted publickey for core from 139.178.89.65 port 42380 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:27.233810 kernel: audit: type=1101 audit(1734075267.226:1423): pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.236155 sshd[4963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:27.234000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.248607 kernel: audit: type=1103 audit(1734075267.234:1424): pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.248733 kernel: audit: type=1006 audit(1734075267.234:1425): pid=4963 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 07:34:27.248920 kernel: audit: type=1300 audit(1734075267.234:1425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb93a2030 a2=3 a3=0 items=0 ppid=1 pid=4963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:27.234000 audit[4963]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb93a2030 a2=3 a3=0 items=0 ppid=1 pid=4963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:27.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:27.256868 kernel: audit: type=1327 audit(1734075267.234:1425): proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:27.260878 systemd[1]: Started session-17.scope. Dec 13 07:34:27.261485 systemd-logind[1185]: New session 17 of user core. Dec 13 07:34:27.269000 audit[4963]: USER_START pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.278995 kernel: audit: type=1105 audit(1734075267.269:1426): pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.277000 audit[4967]: CRED_ACQ pid=4967 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.284804 kernel: audit: type=1103 audit(1734075267.277:1427): pid=4967 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:27.999528 sshd[4963]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:28.004000 audit[4963]: USER_END pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:28.009000 audit[4963]: CRED_DISP pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:28.013989 systemd[1]: sshd@21-10.230.40.198:22-139.178.89.65:42380.service: Deactivated successfully. Dec 13 07:34:28.015361 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 07:34:28.017799 kernel: audit: type=1106 audit(1734075268.004:1428): pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:28.017943 kernel: audit: type=1104 audit(1734075268.009:1429): pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:28.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.40.198:22-139.178.89.65:42380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:28.018550 systemd-logind[1185]: Session 17 logged out. Waiting for processes to exit. Dec 13 07:34:28.021149 systemd-logind[1185]: Removed session 17. Dec 13 07:34:28.149466 systemd[1]: Started sshd@22-10.230.40.198:22-139.178.89.65:42390.service. Dec 13 07:34:28.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.40.198:22-139.178.89.65:42390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:29.061215 sshd[4977]: Accepted publickey for core from 139.178.89.65 port 42390 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:29.060000 audit[4977]: USER_ACCT pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:29.062000 audit[4977]: CRED_ACQ pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:29.063000 audit[4977]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe53f29bf0 a2=3 a3=0 items=0 ppid=1 pid=4977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:29.063000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:29.064473 sshd[4977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:29.074028 systemd[1]: Started session-18.scope. Dec 13 07:34:29.074596 systemd-logind[1185]: New session 18 of user core. Dec 13 07:34:29.082000 audit[4977]: USER_START pid=4977 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:29.085000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:30.090525 sshd[4977]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:30.095000 audit[4977]: USER_END pid=4977 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:30.095000 audit[4977]: CRED_DISP pid=4977 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:30.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.40.198:22-139.178.89.65:42390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:30.100132 systemd-logind[1185]: Session 18 logged out. Waiting for processes to exit. Dec 13 07:34:30.100605 systemd[1]: sshd@22-10.230.40.198:22-139.178.89.65:42390.service: Deactivated successfully. Dec 13 07:34:30.101617 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 07:34:30.103117 systemd-logind[1185]: Removed session 18. Dec 13 07:34:30.236299 systemd[1]: Started sshd@23-10.230.40.198:22-139.178.89.65:38958.service. Dec 13 07:34:30.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.40.198:22-139.178.89.65:38958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:31.151000 audit[4987]: USER_ACCT pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:31.152345 sshd[4987]: Accepted publickey for core from 139.178.89.65 port 38958 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:31.152000 audit[4987]: CRED_ACQ pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:31.153000 audit[4987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8473d4e0 a2=3 a3=0 items=0 ppid=1 pid=4987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:31.153000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:31.156090 sshd[4987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:31.163709 systemd-logind[1185]: New session 19 of user core. Dec 13 07:34:31.165608 systemd[1]: Started session-19.scope. Dec 13 07:34:31.171000 audit[4987]: USER_START pid=4987 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:31.175000 audit[4989]: CRED_ACQ pid=4989 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:31.435223 systemd[1]: run-containerd-runc-k8s.io-394a7ef7293eb301e8ec01ffe7007a194672d51272721075c698dcca123c770e-runc.wREEHP.mount: Deactivated successfully. Dec 13 07:34:34.560000 audit[5018]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.591897 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 07:34:34.593148 kernel: audit: type=1325 audit(1734075274.560:1446): table=filter:118 family=2 entries=20 op=nft_register_rule pid=5018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.593567 kernel: audit: type=1300 audit(1734075274.560:1446): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdc7d68300 a2=0 a3=7ffdc7d682ec items=0 ppid=2260 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.593647 kernel: audit: type=1327 audit(1734075274.560:1446): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:34.560000 audit[5018]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdc7d68300 a2=0 a3=7ffdc7d682ec items=0 ppid=2260 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:34.591000 audit[5018]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.591000 audit[5018]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdc7d68300 a2=0 a3=0 items=0 ppid=2260 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.607728 kernel: audit: type=1325 audit(1734075274.591:1447): table=nat:119 family=2 entries=22 op=nft_register_rule pid=5018 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.607845 kernel: audit: type=1300 audit(1734075274.591:1447): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdc7d68300 a2=0 a3=0 items=0 ppid=2260 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:34.612270 kernel: audit: type=1327 audit(1734075274.591:1447): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:34.617800 sshd[4987]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:34.625000 audit[4987]: USER_END pid=4987 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:34.635812 kernel: audit: type=1106 audit(1734075274.625:1448): pid=4987 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:34.636268 kernel: audit: type=1104 audit(1734075274.626:1449): pid=4987 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:34.626000 audit[4987]: CRED_DISP pid=4987 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:34.639000 audit[5020]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.639000 audit[5020]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd85545bc0 a2=0 a3=7ffd85545bac items=0 ppid=2260 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.653769 kernel: audit: type=1325 audit(1734075274.639:1450): table=filter:120 family=2 entries=32 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.654493 kernel: audit: type=1300 audit(1734075274.639:1450): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd85545bc0 a2=0 a3=7ffd85545bac items=0 ppid=2260 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:34.655000 audit[5020]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:34.655000 audit[5020]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd85545bc0 a2=0 a3=0 items=0 ppid=2260 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:34.655000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:34.662523 systemd[1]: sshd@23-10.230.40.198:22-139.178.89.65:38958.service: Deactivated successfully. Dec 13 07:34:34.665408 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 07:34:34.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.40.198:22-139.178.89.65:38958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:34.668345 systemd-logind[1185]: Session 19 logged out. Waiting for processes to exit. Dec 13 07:34:34.671111 systemd-logind[1185]: Removed session 19. Dec 13 07:34:34.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.40.198:22-139.178.89.65:38970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:34.756158 systemd[1]: Started sshd@24-10.230.40.198:22-139.178.89.65:38970.service. Dec 13 07:34:35.672000 audit[5023]: USER_ACCT pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:35.674309 sshd[5023]: Accepted publickey for core from 139.178.89.65 port 38970 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:35.673000 audit[5023]: CRED_ACQ pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:35.673000 audit[5023]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef2024230 a2=3 a3=0 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:35.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:35.678083 sshd[5023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:35.686818 systemd-logind[1185]: New session 20 of user core. Dec 13 07:34:35.687894 systemd[1]: Started session-20.scope. Dec 13 07:34:35.695000 audit[5023]: USER_START pid=5023 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:35.697000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:36.485000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:36.485000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:36.485000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e04e10 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:34:36.485000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:34:36.485000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b67840 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:34:36.485000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:34:36.889007 sshd[5023]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:36.889000 audit[5023]: USER_END pid=5023 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:36.889000 audit[5023]: CRED_DISP pid=5023 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:36.893438 systemd[1]: sshd@24-10.230.40.198:22-139.178.89.65:38970.service: Deactivated successfully. Dec 13 07:34:36.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.40.198:22-139.178.89.65:38970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:36.894536 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 07:34:36.895575 systemd-logind[1185]: Session 20 logged out. Waiting for processes to exit. Dec 13 07:34:36.897250 systemd-logind[1185]: Removed session 20. Dec 13 07:34:37.038433 systemd[1]: Started sshd@25-10.230.40.198:22-139.178.89.65:38980.service. Dec 13 07:34:37.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.40.198:22-139.178.89.65:38980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:37.948346 sshd[5033]: Accepted publickey for core from 139.178.89.65 port 38980 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:37.947000 audit[5033]: USER_ACCT pid=5033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:37.949000 audit[5033]: CRED_ACQ pid=5033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:37.949000 audit[5033]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa6134030 a2=3 a3=0 items=0 ppid=1 pid=5033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:37.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:37.951890 sshd[5033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:37.958856 systemd-logind[1185]: New session 21 of user core. Dec 13 07:34:37.960994 systemd[1]: Started session-21.scope. Dec 13 07:34:37.969000 audit[5033]: USER_START pid=5033 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:37.971000 audit[5035]: CRED_ACQ pid=5035 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:38.016000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:38.016000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:38.016000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011bc8fc0 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:34:38.016000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:34:38.016000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c007d84660 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:34:38.016000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:34:38.018000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:38.018000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011bc9080 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:34:38.018000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:34:38.019000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:38.019000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0124f6510 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:34:38.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:34:38.167000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:38.167000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00b990500 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:34:38.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:34:38.167000 audit[1917]: AVC avc: denied { watch } for pid=1917 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526926 scontext=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:38.167000 audit[1917]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011bc9710 a2=fc6 a3=0 items=0 ppid=1779 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c525,c606 key=(null) Dec 13 07:34:38.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34302E313938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 07:34:38.699220 sshd[5033]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:38.700000 audit[5033]: USER_END pid=5033 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:38.700000 audit[5033]: CRED_DISP pid=5033 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:38.703433 systemd[1]: sshd@25-10.230.40.198:22-139.178.89.65:38980.service: Deactivated successfully. Dec 13 07:34:38.704515 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 07:34:38.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.40.198:22-139.178.89.65:38980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:38.705561 systemd-logind[1185]: Session 21 logged out. Waiting for processes to exit. Dec 13 07:34:38.706941 systemd-logind[1185]: Removed session 21. Dec 13 07:34:40.408000 audit[3921]: AVC avc: denied { watch } for pid=3921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1984988690/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c156,c465 tclass=file permissive=0 Dec 13 07:34:40.414250 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 07:34:40.414348 kernel: audit: type=1400 audit(1734075280.408:1479): avc: denied { watch } for pid=3921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1984988690/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c156,c465 tclass=file permissive=0 Dec 13 07:34:40.408000 audit[3921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023a6520 a2=fc6 a3=0 items=0 ppid=3501 pid=3921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 key=(null) Dec 13 07:34:40.429215 kernel: audit: type=1300 audit(1734075280.408:1479): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023a6520 a2=fc6 a3=0 items=0 ppid=3501 pid=3921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c156,c465 key=(null) Dec 13 07:34:40.429548 kernel: audit: type=1327 audit(1734075280.408:1479): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:34:40.408000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:34:40.869000 audit[3959]: AVC avc: denied { watch } for pid=3959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1656460445/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c713 tclass=file permissive=0 Dec 13 07:34:40.869000 audit[3959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aa2a60 a2=fc6 a3=0 items=0 ppid=3765 pid=3959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 key=(null) Dec 13 07:34:40.884487 kernel: audit: type=1400 audit(1734075280.869:1480): avc: denied { watch } for pid=3959 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_07_32_19.1656460445/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c359,c713 tclass=file permissive=0 Dec 13 07:34:40.884662 kernel: audit: type=1300 audit(1734075280.869:1480): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aa2a60 a2=fc6 a3=0 items=0 ppid=3765 pid=3959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c359,c713 key=(null) Dec 13 07:34:40.869000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:34:40.891882 kernel: audit: type=1327 audit(1734075280.869:1480): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 07:34:41.570000 audit[5065]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:41.570000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed678d740 a2=0 a3=7ffed678d72c items=0 ppid=2260 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:41.584027 kernel: audit: type=1325 audit(1734075281.570:1481): table=filter:122 family=2 entries=20 op=nft_register_rule pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:41.584141 kernel: audit: type=1300 audit(1734075281.570:1481): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed678d740 a2=0 a3=7ffed678d72c items=0 ppid=2260 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:41.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:41.588000 audit[5065]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:41.594860 kernel: audit: type=1327 audit(1734075281.570:1481): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:41.594950 kernel: audit: type=1325 audit(1734075281.588:1482): table=nat:123 family=2 entries=106 op=nft_register_chain pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 07:34:41.588000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed678d740 a2=0 a3=7ffed678d72c items=0 ppid=2260 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:41.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 07:34:43.063000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:43.063000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001341e40 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:34:43.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:34:43.063000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:43.063000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001341e60 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:34:43.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:34:43.064000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:43.064000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e01140 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:34:43.064000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:34:43.069000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526920 scontext=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 07:34:43.069000 audit[1952]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e01a80 a2=fc6 a3=0 items=0 ppid=1808 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c821,c1018 key=(null) Dec 13 07:34:43.069000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 07:34:43.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.230.40.198:22-139.178.89.65:50684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:43.852204 systemd[1]: Started sshd@26-10.230.40.198:22-139.178.89.65:50684.service. Dec 13 07:34:44.788000 audit[5070]: USER_ACCT pid=5070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:44.790121 sshd[5070]: Accepted publickey for core from 139.178.89.65 port 50684 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:44.791000 audit[5070]: CRED_ACQ pid=5070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:44.791000 audit[5070]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd92ca2c60 a2=3 a3=0 items=0 ppid=1 pid=5070 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:44.791000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:44.795507 sshd[5070]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:44.811381 systemd[1]: Started session-22.scope. Dec 13 07:34:44.812284 systemd-logind[1185]: New session 22 of user core. Dec 13 07:34:44.819000 audit[5070]: USER_START pid=5070 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:44.822000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:45.744113 sshd[5070]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:45.755904 kernel: kauditd_printk_skb: 22 callbacks suppressed Dec 13 07:34:45.757678 kernel: audit: type=1106 audit(1734075285.745:1493): pid=5070 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:45.745000 audit[5070]: USER_END pid=5070 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:45.753327 systemd[1]: sshd@26-10.230.40.198:22-139.178.89.65:50684.service: Deactivated successfully. Dec 13 07:34:45.754895 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 07:34:45.745000 audit[5070]: CRED_DISP pid=5070 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:45.774853 systemd-logind[1185]: Session 22 logged out. Waiting for processes to exit. Dec 13 07:34:45.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.230.40.198:22-139.178.89.65:50684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:45.785838 kernel: audit: type=1104 audit(1734075285.745:1494): pid=5070 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:45.786596 kernel: audit: type=1131 audit(1734075285.751:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.230.40.198:22-139.178.89.65:50684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:45.786820 systemd-logind[1185]: Removed session 22. Dec 13 07:34:50.894474 systemd[1]: Started sshd@27-10.230.40.198:22-139.178.89.65:38198.service. Dec 13 07:34:50.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.230.40.198:22-139.178.89.65:38198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:50.905825 kernel: audit: type=1130 audit(1734075290.894:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.230.40.198:22-139.178.89.65:38198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:51.850000 audit[5101]: USER_ACCT pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.851808 sshd[5101]: Accepted publickey for core from 139.178.89.65 port 38198 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:51.858899 kernel: audit: type=1101 audit(1734075291.850:1497): pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.858000 audit[5101]: CRED_ACQ pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.860334 sshd[5101]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:51.866230 kernel: audit: type=1103 audit(1734075291.858:1498): pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.866303 kernel: audit: type=1006 audit(1734075291.859:1499): pid=5101 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 07:34:51.859000 audit[5101]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff458d3b70 a2=3 a3=0 items=0 ppid=1 pid=5101 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:51.878116 kernel: audit: type=1300 audit(1734075291.859:1499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff458d3b70 a2=3 a3=0 items=0 ppid=1 pid=5101 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:51.859000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:51.880846 kernel: audit: type=1327 audit(1734075291.859:1499): proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:51.888615 systemd-logind[1185]: New session 23 of user core. Dec 13 07:34:51.889838 systemd[1]: Started session-23.scope. Dec 13 07:34:51.897000 audit[5101]: USER_START pid=5101 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.905828 kernel: audit: type=1105 audit(1734075291.897:1500): pid=5101 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.900000 audit[5103]: CRED_ACQ pid=5103 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:51.913837 kernel: audit: type=1103 audit(1734075291.900:1501): pid=5103 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:52.719761 sshd[5101]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:52.723000 audit[5101]: USER_END pid=5101 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:52.730509 systemd[1]: sshd@27-10.230.40.198:22-139.178.89.65:38198.service: Deactivated successfully. Dec 13 07:34:52.731910 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 07:34:52.734851 kernel: audit: type=1106 audit(1734075292.723:1502): pid=5101 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:52.735607 systemd-logind[1185]: Session 23 logged out. Waiting for processes to exit. Dec 13 07:34:52.723000 audit[5101]: CRED_DISP pid=5101 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:52.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.230.40.198:22-139.178.89.65:38198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:52.743590 kernel: audit: type=1104 audit(1734075292.723:1503): pid=5101 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:52.742744 systemd-logind[1185]: Removed session 23. Dec 13 07:34:57.867560 systemd[1]: Started sshd@28-10.230.40.198:22-139.178.89.65:38212.service. Dec 13 07:34:57.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.230.40.198:22-139.178.89.65:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:57.874715 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 07:34:57.875319 kernel: audit: type=1130 audit(1734075297.867:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.230.40.198:22-139.178.89.65:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 07:34:58.819341 sshd[5114]: Accepted publickey for core from 139.178.89.65 port 38212 ssh2: RSA SHA256:dQnQ6z9Pj/RNX8sNR4TqdGn8nHqynNIoEP6sXMH78jY Dec 13 07:34:58.818000 audit[5114]: USER_ACCT pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.825824 kernel: audit: type=1101 audit(1734075298.818:1506): pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.825000 audit[5114]: CRED_ACQ pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.836277 kernel: audit: type=1103 audit(1734075298.825:1507): pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.836401 kernel: audit: type=1006 audit(1734075298.825:1508): pid=5114 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 07:34:58.825000 audit[5114]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdebce90e0 a2=3 a3=0 items=0 ppid=1 pid=5114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:58.843116 kernel: audit: type=1300 audit(1734075298.825:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdebce90e0 a2=3 a3=0 items=0 ppid=1 pid=5114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 07:34:58.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:58.845800 kernel: audit: type=1327 audit(1734075298.825:1508): proctitle=737368643A20636F7265205B707269765D Dec 13 07:34:58.847111 sshd[5114]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 07:34:58.856990 systemd[1]: Started session-24.scope. Dec 13 07:34:58.858833 systemd-logind[1185]: New session 24 of user core. Dec 13 07:34:58.866000 audit[5114]: USER_START pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.878874 kernel: audit: type=1105 audit(1734075298.866:1509): pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.878000 audit[5116]: CRED_ACQ pid=5116 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:58.885882 kernel: audit: type=1103 audit(1734075298.878:1510): pid=5116 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:59.714667 sshd[5114]: pam_unix(sshd:session): session closed for user core Dec 13 07:34:59.718000 audit[5114]: USER_END pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:59.727818 kernel: audit: type=1106 audit(1734075299.718:1511): pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:59.728144 systemd[1]: sshd@28-10.230.40.198:22-139.178.89.65:38212.service: Deactivated successfully. Dec 13 07:34:59.729743 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 07:34:59.731581 systemd-logind[1185]: Session 24 logged out. Waiting for processes to exit. Dec 13 07:34:59.733130 systemd-logind[1185]: Removed session 24. Dec 13 07:34:59.718000 audit[5114]: CRED_DISP pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:59.739801 kernel: audit: type=1104 audit(1734075299.718:1512): pid=5114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 07:34:59.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.230.40.198:22-139.178.89.65:38212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'