Dec 13 15:19:42.936243 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:19:42.936284 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:19:42.936304 kernel: BIOS-provided physical RAM map: Dec 13 15:19:42.936315 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 15:19:42.936324 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 15:19:42.936334 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 15:19:42.936345 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 15:19:42.936356 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 15:19:42.936365 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 15:19:42.936375 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 15:19:42.936389 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 15:19:42.936399 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 15:19:42.936409 kernel: NX (Execute Disable) protection: active Dec 13 15:19:42.936419 kernel: SMBIOS 2.8 present. Dec 13 15:19:42.936432 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Dec 13 15:19:42.936443 kernel: Hypervisor detected: KVM Dec 13 15:19:42.936457 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 15:19:42.936468 kernel: kvm-clock: cpu 0, msr 6419a001, primary cpu clock Dec 13 15:19:42.936478 kernel: kvm-clock: using sched offset of 4864523260 cycles Dec 13 15:19:42.936490 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 15:19:42.936501 kernel: tsc: Detected 2499.998 MHz processor Dec 13 15:19:42.936512 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:19:42.936523 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:19:42.936534 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 15:19:42.936544 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:19:42.936558 kernel: Using GB pages for direct mapping Dec 13 15:19:42.936569 kernel: ACPI: Early table checksum verification disabled Dec 13 15:19:42.936580 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 13 15:19:42.936591 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936601 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936612 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936623 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 15:19:42.936633 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936644 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936659 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936670 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:19:42.936680 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 15:19:42.936691 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 15:19:42.936702 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 15:19:42.936713 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 15:19:42.936729 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 15:19:42.936744 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 15:19:42.936755 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 15:19:42.936767 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 15:19:42.936778 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 15:19:42.936790 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 15:19:42.936801 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 15:19:42.936812 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 15:19:42.936827 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 15:19:42.940745 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 15:19:42.940767 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 15:19:42.940780 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 15:19:42.940791 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 15:19:42.940803 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 15:19:42.940814 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 15:19:42.940826 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 15:19:42.940848 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 15:19:42.940861 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 15:19:42.940878 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 15:19:42.940890 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 15:19:42.940902 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 15:19:42.940913 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 15:19:42.940925 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 15:19:42.940937 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 15:19:42.940949 kernel: Zone ranges: Dec 13 15:19:42.940961 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:19:42.940983 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 15:19:42.941001 kernel: Normal empty Dec 13 15:19:42.941013 kernel: Movable zone start for each node Dec 13 15:19:42.941024 kernel: Early memory node ranges Dec 13 15:19:42.941036 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 15:19:42.941047 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 15:19:42.941059 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 15:19:42.941070 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:19:42.941081 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 15:19:42.941093 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 15:19:42.941108 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 15:19:42.941119 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 15:19:42.941131 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 15:19:42.941142 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:19:42.941154 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 15:19:42.941165 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:19:42.941177 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 15:19:42.941188 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 15:19:42.941200 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:19:42.941215 kernel: TSC deadline timer available Dec 13 15:19:42.941227 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 15:19:42.941238 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 15:19:42.941250 kernel: Booting paravirtualized kernel on KVM Dec 13 15:19:42.941261 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:19:42.941273 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:19:42.941285 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:19:42.941296 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:19:42.941308 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:19:42.941323 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 15:19:42.941334 kernel: kvm-guest: PV spinlocks enabled Dec 13 15:19:42.941346 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 15:19:42.941358 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 15:19:42.941369 kernel: Policy zone: DMA32 Dec 13 15:19:42.941382 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:19:42.941394 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:19:42.941406 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:19:42.941421 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 15:19:42.941433 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:19:42.941445 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 192524K reserved, 0K cma-reserved) Dec 13 15:19:42.941457 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:19:42.941469 kernel: Kernel/User page tables isolation: enabled Dec 13 15:19:42.941480 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:19:42.941491 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:19:42.941503 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:19:42.941515 kernel: rcu: RCU event tracing is enabled. Dec 13 15:19:42.941531 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:19:42.941543 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:19:42.941554 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:19:42.941566 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:19:42.941578 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:19:42.941589 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 15:19:42.941601 kernel: random: crng init done Dec 13 15:19:42.941624 kernel: Console: colour VGA+ 80x25 Dec 13 15:19:42.941636 kernel: printk: console [tty0] enabled Dec 13 15:19:42.941648 kernel: printk: console [ttyS0] enabled Dec 13 15:19:42.941660 kernel: ACPI: Core revision 20210730 Dec 13 15:19:42.941672 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:19:42.941688 kernel: x2apic enabled Dec 13 15:19:42.941700 kernel: Switched APIC routing to physical x2apic. Dec 13 15:19:42.941713 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Dec 13 15:19:42.941725 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Dec 13 15:19:42.941737 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 15:19:42.941753 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 15:19:42.941765 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 15:19:42.941777 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:19:42.941789 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 15:19:42.941801 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:19:42.941813 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 15:19:42.941825 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Dec 13 15:19:42.941857 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:19:42.941871 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:19:42.941883 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 15:19:42.941895 kernel: MMIO Stale Data: Unknown: No mitigations Dec 13 15:19:42.941912 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 15:19:42.941924 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:19:42.941937 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:19:42.941949 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:19:42.941961 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:19:42.941982 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 15:19:42.941996 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:19:42.942007 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:19:42.942019 kernel: LSM: Security Framework initializing Dec 13 15:19:42.942031 kernel: SELinux: Initializing. Dec 13 15:19:42.942043 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:19:42.942060 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:19:42.942072 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Dec 13 15:19:42.942084 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Dec 13 15:19:42.942096 kernel: signal: max sigframe size: 1776 Dec 13 15:19:42.942108 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:19:42.942120 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 15:19:42.942132 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:19:42.942144 kernel: x86: Booting SMP configuration: Dec 13 15:19:42.942156 kernel: .... node #0, CPUs: #1 Dec 13 15:19:42.942172 kernel: kvm-clock: cpu 1, msr 6419a041, secondary cpu clock Dec 13 15:19:42.942184 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 15:19:42.942196 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 15:19:42.942208 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 15:19:42.942220 kernel: smpboot: Max logical packages: 16 Dec 13 15:19:42.942232 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Dec 13 15:19:42.942244 kernel: devtmpfs: initialized Dec 13 15:19:42.942256 kernel: x86/mm: Memory block size: 128MB Dec 13 15:19:42.942268 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:19:42.942280 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:19:42.942296 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:19:42.942308 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:19:42.942320 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:19:42.942332 kernel: audit: type=2000 audit(1734103182.001:1): state=initialized audit_enabled=0 res=1 Dec 13 15:19:42.942344 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:19:42.942356 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:19:42.942368 kernel: cpuidle: using governor menu Dec 13 15:19:42.942380 kernel: ACPI: bus type PCI registered Dec 13 15:19:42.942392 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:19:42.942408 kernel: dca service started, version 1.12.1 Dec 13 15:19:42.942420 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 15:19:42.942432 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 15:19:42.942444 kernel: PCI: Using configuration type 1 for base access Dec 13 15:19:42.942456 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:19:42.942468 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:19:42.942480 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:19:42.942492 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:19:42.942508 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:19:42.942520 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:19:42.942532 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:19:42.942543 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:19:42.942556 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:19:42.942568 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:19:42.942580 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 15:19:42.942592 kernel: ACPI: Interpreter enabled Dec 13 15:19:42.942604 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:19:42.942616 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:19:42.942632 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:19:42.942644 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 15:19:42.942656 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 15:19:42.942918 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:19:42.943095 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 15:19:42.943252 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 15:19:42.943270 kernel: PCI host bridge to bus 0000:00 Dec 13 15:19:42.943457 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:19:42.943601 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:19:42.943742 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:19:42.943897 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 15:19:42.944053 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 15:19:42.944193 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:19:42.944333 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 15:19:42.944521 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 15:19:42.944689 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 15:19:42.944861 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 15:19:42.945035 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 15:19:42.945189 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 15:19:42.945343 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:19:42.945535 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.945695 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 15:19:42.945884 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.946057 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 15:19:42.946222 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.946379 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 15:19:42.946548 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.946701 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 15:19:42.951935 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.952126 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 15:19:42.952297 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.952454 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 15:19:42.952623 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.952779 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 15:19:42.952958 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 15:19:42.953134 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 15:19:42.953308 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 15:19:42.953469 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 15:19:42.953625 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 15:19:42.953797 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 15:19:42.953965 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 15:19:42.954141 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 15:19:42.954304 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 15:19:42.954456 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 15:19:42.954631 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 15:19:42.954796 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 15:19:42.954990 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 15:19:42.955158 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 15:19:42.955354 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Dec 13 15:19:42.955542 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 15:19:42.955730 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 15:19:42.955920 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 15:19:42.956149 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 15:19:42.956335 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 15:19:42.956524 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:19:42.956717 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:19:42.956891 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:19:42.957116 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 15:19:42.957330 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 15:19:42.957549 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 15:19:42.957754 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:19:42.957956 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:19:42.958158 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 15:19:42.958326 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 15:19:42.958491 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:19:42.958663 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:19:42.958845 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:19:42.968031 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 15:19:42.968208 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 15:19:42.968383 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:19:42.968542 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:19:42.968713 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:19:42.968867 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:19:42.969062 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:19:42.969215 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:19:42.969391 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:19:42.969551 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:19:42.969698 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:19:42.969858 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:19:42.970038 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:19:42.970191 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:19:42.970352 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:19:42.970513 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:19:42.970667 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:19:42.970840 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:19:42.971017 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:19:42.971171 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:19:42.971189 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 15:19:42.971202 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 15:19:42.971221 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 15:19:42.971234 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 15:19:42.971246 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 15:19:42.971258 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 15:19:42.971270 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 15:19:42.971283 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 15:19:42.971295 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 15:19:42.971307 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 15:19:42.971320 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 15:19:42.971336 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 15:19:42.971349 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 15:19:42.971360 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 15:19:42.971373 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 15:19:42.971385 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 15:19:42.971397 kernel: iommu: Default domain type: Translated Dec 13 15:19:42.971409 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:19:42.971558 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 15:19:42.971710 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:19:42.971887 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 15:19:42.971906 kernel: vgaarb: loaded Dec 13 15:19:42.971919 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:19:42.971931 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:19:42.971944 kernel: PTP clock support registered Dec 13 15:19:42.971956 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:19:42.971968 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:19:42.971992 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 15:19:42.972010 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 15:19:42.972023 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 15:19:42.972035 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:19:42.972048 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:19:42.972060 kernel: pnp: PnP ACPI init Dec 13 15:19:42.972234 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 15:19:42.972254 kernel: pnp: PnP ACPI: found 5 devices Dec 13 15:19:42.972267 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:19:42.972285 kernel: NET: Registered PF_INET protocol family Dec 13 15:19:42.972298 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 15:19:42.972311 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 15:19:42.972323 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:19:42.972335 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 15:19:42.972348 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:19:42.972360 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 15:19:42.972372 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:19:42.972385 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:19:42.972401 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:19:42.972413 kernel: NET: Registered PF_XDP protocol family Dec 13 15:19:42.972563 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Dec 13 15:19:42.972727 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 15:19:42.972923 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 15:19:42.973091 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 15:19:42.973244 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 15:19:42.973402 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 15:19:42.973553 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 15:19:42.973716 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 15:19:42.973879 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 15:19:42.974065 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 15:19:42.974218 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 15:19:42.974378 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 15:19:42.974539 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 15:19:42.974715 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 15:19:42.974868 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 15:19:42.986256 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Dec 13 15:19:42.986432 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:19:42.986595 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:19:42.986752 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:19:42.986927 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Dec 13 15:19:42.987106 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:19:42.987265 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:19:42.987440 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:19:42.987592 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Dec 13 15:19:42.987744 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:19:42.987913 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:19:42.988081 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:19:42.988234 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Dec 13 15:19:42.988418 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:19:42.988586 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:19:42.988766 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:19:42.988959 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Dec 13 15:19:42.989151 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:19:42.989317 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:19:42.989483 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:19:42.989653 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Dec 13 15:19:42.989840 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:19:42.990040 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:19:42.990208 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:19:42.990376 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Dec 13 15:19:42.990542 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:19:42.990708 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:19:42.990908 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:19:42.991105 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Dec 13 15:19:42.991264 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:19:42.991430 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:19:42.991595 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:19:42.991762 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Dec 13 15:19:42.991957 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:19:42.992163 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:19:42.992334 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:19:42.992497 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:19:42.992650 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:19:42.992815 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 15:19:42.993030 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 15:19:42.993184 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:19:42.993383 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Dec 13 15:19:42.993560 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 15:19:42.993720 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:19:43.000361 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 15:19:43.000548 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Dec 13 15:19:43.000701 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 15:19:43.000866 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:19:43.001049 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Dec 13 15:19:43.001200 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 15:19:43.001347 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:19:43.001504 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Dec 13 15:19:43.001652 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 15:19:43.001799 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:19:43.002085 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Dec 13 15:19:43.002242 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 15:19:43.002389 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:19:43.002545 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Dec 13 15:19:43.002693 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 15:19:43.002849 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:19:43.003043 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Dec 13 15:19:43.003199 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 15:19:43.003344 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:19:43.003503 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Dec 13 15:19:43.003651 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 15:19:43.003796 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:19:43.003816 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 15:19:43.003830 kernel: PCI: CLS 0 bytes, default 64 Dec 13 15:19:43.003870 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:19:43.003890 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 15:19:43.003904 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 15:19:43.003917 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Dec 13 15:19:43.003930 kernel: Initialise system trusted keyrings Dec 13 15:19:43.003943 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 15:19:43.003956 kernel: Key type asymmetric registered Dec 13 15:19:43.003978 kernel: Asymmetric key parser 'x509' registered Dec 13 15:19:43.003994 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:19:43.004007 kernel: io scheduler mq-deadline registered Dec 13 15:19:43.004025 kernel: io scheduler kyber registered Dec 13 15:19:43.004038 kernel: io scheduler bfq registered Dec 13 15:19:43.004195 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 15:19:43.004350 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 15:19:43.004504 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.004658 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 15:19:43.004811 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 15:19:43.004998 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.005155 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 15:19:43.005309 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 15:19:43.005462 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.005616 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 15:19:43.005769 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 15:19:43.005950 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.006119 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 15:19:43.006274 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 15:19:43.006433 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.006604 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 15:19:43.006757 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 15:19:43.012880 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.013080 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 15:19:43.013240 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 15:19:43.013398 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.013557 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 15:19:43.013711 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 15:19:43.013895 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:19:43.013916 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:19:43.013931 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 15:19:43.013945 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 15:19:43.013958 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:19:43.013984 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:19:43.013999 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 15:19:43.014012 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 15:19:43.014031 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 15:19:43.014203 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 15:19:43.014225 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 15:19:43.014370 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 15:19:43.014516 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T15:19:42 UTC (1734103182) Dec 13 15:19:43.014660 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 15:19:43.014678 kernel: intel_pstate: CPU model not supported Dec 13 15:19:43.014698 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:19:43.014711 kernel: Segment Routing with IPv6 Dec 13 15:19:43.014724 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:19:43.014737 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:19:43.014751 kernel: Key type dns_resolver registered Dec 13 15:19:43.014764 kernel: IPI shorthand broadcast: enabled Dec 13 15:19:43.014777 kernel: sched_clock: Marking stable (972256054, 220651510)->(1474298686, -281391122) Dec 13 15:19:43.014790 kernel: registered taskstats version 1 Dec 13 15:19:43.014804 kernel: Loading compiled-in X.509 certificates Dec 13 15:19:43.014817 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:19:43.014850 kernel: Key type .fscrypt registered Dec 13 15:19:43.014866 kernel: Key type fscrypt-provisioning registered Dec 13 15:19:43.014879 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 15:19:43.014892 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:19:43.014905 kernel: ima: No architecture policies found Dec 13 15:19:43.014918 kernel: clk: Disabling unused clocks Dec 13 15:19:43.014931 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:19:43.014944 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:19:43.014962 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:19:43.014986 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:19:43.015000 kernel: Run /init as init process Dec 13 15:19:43.015012 kernel: with arguments: Dec 13 15:19:43.015025 kernel: /init Dec 13 15:19:43.015038 kernel: with environment: Dec 13 15:19:43.015051 kernel: HOME=/ Dec 13 15:19:43.015063 kernel: TERM=linux Dec 13 15:19:43.015076 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:19:43.015099 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:19:43.015122 systemd[1]: Detected virtualization kvm. Dec 13 15:19:43.015136 systemd[1]: Detected architecture x86-64. Dec 13 15:19:43.015150 systemd[1]: Running in initrd. Dec 13 15:19:43.015163 systemd[1]: No hostname configured, using default hostname. Dec 13 15:19:43.015177 systemd[1]: Hostname set to . Dec 13 15:19:43.015191 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:19:43.015209 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:19:43.015222 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:19:43.015236 systemd[1]: Reached target cryptsetup.target. Dec 13 15:19:43.015249 systemd[1]: Reached target paths.target. Dec 13 15:19:43.015269 systemd[1]: Reached target slices.target. Dec 13 15:19:43.015287 systemd[1]: Reached target swap.target. Dec 13 15:19:43.015301 systemd[1]: Reached target timers.target. Dec 13 15:19:43.015315 systemd[1]: Listening on iscsid.socket. Dec 13 15:19:43.015338 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:19:43.015351 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:19:43.015369 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:19:43.015383 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:19:43.015404 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:19:43.015417 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:19:43.015431 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:19:43.015445 systemd[1]: Reached target sockets.target. Dec 13 15:19:43.015469 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:19:43.015487 systemd[1]: Finished network-cleanup.service. Dec 13 15:19:43.015501 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:19:43.015514 systemd[1]: Starting systemd-journald.service... Dec 13 15:19:43.015535 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:19:43.015549 systemd[1]: Starting systemd-resolved.service... Dec 13 15:19:43.015563 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:19:43.015577 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:19:43.015591 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:19:43.015604 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:19:43.015622 kernel: Bridge firewalling registered Dec 13 15:19:43.015646 systemd-journald[201]: Journal started Dec 13 15:19:43.015721 systemd-journald[201]: Runtime Journal (/run/log/journal/32298001303844ee9da11057d57b04ec) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:19:42.931925 systemd-modules-load[202]: Inserted module 'overlay' Dec 13 15:19:43.039924 systemd[1]: Started systemd-resolved.service. Dec 13 15:19:43.039963 kernel: audit: type=1130 audit(1734103183.031:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:42.984647 systemd-resolved[203]: Positive Trust Anchors: Dec 13 15:19:43.058941 systemd[1]: Started systemd-journald.service. Dec 13 15:19:43.058995 kernel: audit: type=1130 audit(1734103183.039:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.059025 kernel: SCSI subsystem initialized Dec 13 15:19:43.059044 kernel: audit: type=1130 audit(1734103183.048:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:42.984670 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:19:43.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:42.984717 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:19:43.070453 kernel: audit: type=1130 audit(1734103183.059:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:42.989679 systemd-resolved[203]: Defaulting to hostname 'linux'. Dec 13 15:19:43.078917 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:19:43.078956 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:19:43.078984 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:19:43.016155 systemd-modules-load[202]: Inserted module 'br_netfilter' Dec 13 15:19:43.049245 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:19:43.060591 systemd[1]: Reached target nss-lookup.target. Dec 13 15:19:43.069518 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:19:43.082795 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:19:43.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.090944 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:19:43.097642 kernel: audit: type=1130 audit(1734103183.090:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.098020 systemd-modules-load[202]: Inserted module 'dm_multipath' Dec 13 15:19:43.099216 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:19:43.106468 kernel: audit: type=1130 audit(1734103183.099:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.101812 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:19:43.111758 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:19:43.114362 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:19:43.115372 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:19:43.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.141077 kernel: audit: type=1130 audit(1734103183.111:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.141147 kernel: audit: type=1130 audit(1734103183.115:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.141230 dracut-cmdline[224]: dracut-dracut-053 Dec 13 15:19:43.141230 dracut-cmdline[224]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:19:43.213878 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:19:43.235873 kernel: iscsi: registered transport (tcp) Dec 13 15:19:43.265163 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:19:43.265232 kernel: QLogic iSCSI HBA Driver Dec 13 15:19:43.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.314288 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:19:43.322230 kernel: audit: type=1130 audit(1734103183.314:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.316173 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:19:43.375926 kernel: raid6: sse2x4 gen() 13609 MB/s Dec 13 15:19:43.392892 kernel: raid6: sse2x4 xor() 7686 MB/s Dec 13 15:19:43.410889 kernel: raid6: sse2x2 gen() 9544 MB/s Dec 13 15:19:43.428909 kernel: raid6: sse2x2 xor() 7778 MB/s Dec 13 15:19:43.446901 kernel: raid6: sse2x1 gen() 9873 MB/s Dec 13 15:19:43.465508 kernel: raid6: sse2x1 xor() 7075 MB/s Dec 13 15:19:43.465599 kernel: raid6: using algorithm sse2x4 gen() 13609 MB/s Dec 13 15:19:43.465621 kernel: raid6: .... xor() 7686 MB/s, rmw enabled Dec 13 15:19:43.466848 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 15:19:43.483870 kernel: xor: automatically using best checksumming function avx Dec 13 15:19:43.601871 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:19:43.614660 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:19:43.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.615000 audit: BPF prog-id=7 op=LOAD Dec 13 15:19:43.615000 audit: BPF prog-id=8 op=LOAD Dec 13 15:19:43.616723 systemd[1]: Starting systemd-udevd.service... Dec 13 15:19:43.634358 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 15:19:43.643299 systemd[1]: Started systemd-udevd.service. Dec 13 15:19:43.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.645234 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:19:43.663726 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 15:19:43.705443 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:19:43.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.707247 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:19:43.798392 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:19:43.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:43.894883 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:19:43.897860 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 15:19:43.936224 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:19:43.936258 kernel: GPT:17805311 != 125829119 Dec 13 15:19:43.936276 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:19:43.936293 kernel: GPT:17805311 != 125829119 Dec 13 15:19:43.936309 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:19:43.936325 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:19:43.963882 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (448) Dec 13 15:19:43.967382 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:19:44.058249 kernel: AVX version of gcm_enc/dec engaged. Dec 13 15:19:44.058306 kernel: AES CTR mode by8 optimization enabled Dec 13 15:19:44.058325 kernel: ACPI: bus type USB registered Dec 13 15:19:44.058342 kernel: usbcore: registered new interface driver usbfs Dec 13 15:19:44.058358 kernel: usbcore: registered new interface driver hub Dec 13 15:19:44.058381 kernel: usbcore: registered new device driver usb Dec 13 15:19:44.058399 kernel: libata version 3.00 loaded. Dec 13 15:19:44.058416 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 15:19:44.124328 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 15:19:44.124356 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 15:19:44.124573 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 15:19:44.124756 kernel: scsi host0: ahci Dec 13 15:19:44.124990 kernel: scsi host1: ahci Dec 13 15:19:44.125175 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:19:44.125371 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 15:19:44.125550 kernel: scsi host2: ahci Dec 13 15:19:44.125751 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 15:19:44.126352 kernel: scsi host3: ahci Dec 13 15:19:44.127144 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:19:44.127345 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 15:19:44.127546 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 15:19:44.127724 kernel: hub 1-0:1.0: USB hub found Dec 13 15:19:44.128823 kernel: hub 1-0:1.0: 4 ports detected Dec 13 15:19:44.129089 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 15:19:44.129388 kernel: hub 2-0:1.0: USB hub found Dec 13 15:19:44.129603 kernel: hub 2-0:1.0: 4 ports detected Dec 13 15:19:44.129794 kernel: scsi host4: ahci Dec 13 15:19:44.130112 kernel: scsi host5: ahci Dec 13 15:19:44.130300 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Dec 13 15:19:44.130327 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Dec 13 15:19:44.130346 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Dec 13 15:19:44.130363 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Dec 13 15:19:44.130380 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Dec 13 15:19:44.130397 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Dec 13 15:19:44.074860 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:19:44.090934 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:19:44.103597 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:19:44.121471 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:19:44.123446 systemd[1]: Starting disk-uuid.service... Dec 13 15:19:44.136282 disk-uuid[530]: Primary Header is updated. Dec 13 15:19:44.136282 disk-uuid[530]: Secondary Entries is updated. Dec 13 15:19:44.136282 disk-uuid[530]: Secondary Header is updated. Dec 13 15:19:44.142866 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:19:44.148884 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:19:44.331903 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 15:19:44.432700 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 15:19:44.432787 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:19:44.436186 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:19:44.436224 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 15:19:44.436871 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:19:44.442439 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:19:44.472865 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:19:44.480309 kernel: usbcore: registered new interface driver usbhid Dec 13 15:19:44.480351 kernel: usbhid: USB HID core driver Dec 13 15:19:44.486860 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Dec 13 15:19:44.490875 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 15:19:45.151791 disk-uuid[531]: The operation has completed successfully. Dec 13 15:19:45.152775 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:19:45.220970 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:19:45.221138 systemd[1]: Finished disk-uuid.service. Dec 13 15:19:45.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.227896 systemd[1]: Starting verity-setup.service... Dec 13 15:19:45.252875 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Dec 13 15:19:45.313140 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:19:45.316305 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:19:45.319823 systemd[1]: Finished verity-setup.service. Dec 13 15:19:45.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.416877 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:19:45.418428 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:19:45.419394 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:19:45.420610 systemd[1]: Starting ignition-setup.service... Dec 13 15:19:45.422528 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:19:45.443893 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:19:45.443997 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:19:45.444018 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:19:45.467691 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 15:19:45.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.478556 systemd[1]: Finished ignition-setup.service. Dec 13 15:19:45.482158 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:19:45.556687 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:19:45.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.558000 audit: BPF prog-id=9 op=LOAD Dec 13 15:19:45.560379 systemd[1]: Starting systemd-networkd.service... Dec 13 15:19:45.600461 systemd-networkd[710]: lo: Link UP Dec 13 15:19:45.601684 systemd-networkd[710]: lo: Gained carrier Dec 13 15:19:45.603446 systemd-networkd[710]: Enumeration completed Dec 13 15:19:45.604474 systemd[1]: Started systemd-networkd.service. Dec 13 15:19:45.605454 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:19:45.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.607022 systemd[1]: Reached target network.target. Dec 13 15:19:45.623259 systemd-networkd[710]: eth0: Link UP Dec 13 15:19:45.623268 systemd-networkd[710]: eth0: Gained carrier Dec 13 15:19:45.625687 systemd[1]: Starting iscsiuio.service... Dec 13 15:19:45.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.637758 systemd[1]: Started iscsiuio.service. Dec 13 15:19:45.639829 systemd[1]: Starting iscsid.service... Dec 13 15:19:45.646482 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:19:45.646482 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:19:45.646482 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:19:45.646482 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:19:45.646482 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:19:45.646482 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:19:45.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.648479 systemd[1]: Started iscsid.service. Dec 13 15:19:45.652604 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:19:45.663008 systemd-networkd[710]: eth0: DHCPv4 address 10.244.14.190/30, gateway 10.244.14.189 acquired from 10.244.14.189 Dec 13 15:19:45.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.677037 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:19:45.677856 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:19:45.678476 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:19:45.679112 systemd[1]: Reached target remote-fs.target. Dec 13 15:19:45.681966 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:19:45.692030 ignition[648]: Ignition 2.14.0 Dec 13 15:19:45.692058 ignition[648]: Stage: fetch-offline Dec 13 15:19:45.692174 ignition[648]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:45.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.692214 ignition[648]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:45.696238 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:19:45.696665 ignition[648]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:45.700817 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:19:45.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.696827 ignition[648]: parsed url from cmdline: "" Dec 13 15:19:45.702618 systemd[1]: Starting ignition-fetch.service... Dec 13 15:19:45.696851 ignition[648]: no config URL provided Dec 13 15:19:45.696863 ignition[648]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:19:45.696880 ignition[648]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:19:45.696902 ignition[648]: failed to fetch config: resource requires networking Dec 13 15:19:45.699078 ignition[648]: Ignition finished successfully Dec 13 15:19:45.714677 ignition[729]: Ignition 2.14.0 Dec 13 15:19:45.714695 ignition[729]: Stage: fetch Dec 13 15:19:45.714898 ignition[729]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:45.714949 ignition[729]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:45.716266 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:45.716404 ignition[729]: parsed url from cmdline: "" Dec 13 15:19:45.716412 ignition[729]: no config URL provided Dec 13 15:19:45.716421 ignition[729]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:19:45.716436 ignition[729]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:19:45.722082 ignition[729]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 15:19:45.722111 ignition[729]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 15:19:45.723225 ignition[729]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 15:19:45.745033 ignition[729]: GET result: OK Dec 13 15:19:45.745196 ignition[729]: parsing config with SHA512: 55f234c163370d6fe20aedd8717383f47768f6ab4e962f932896149f4ac664bd8d09acb757737e089effa099baead9d30fb79b3d40fdccb4460f937ed5fb0432 Dec 13 15:19:45.757665 unknown[729]: fetched base config from "system" Dec 13 15:19:45.758529 unknown[729]: fetched base config from "system" Dec 13 15:19:45.759311 unknown[729]: fetched user config from "openstack" Dec 13 15:19:45.760597 ignition[729]: fetch: fetch complete Dec 13 15:19:45.761321 ignition[729]: fetch: fetch passed Dec 13 15:19:45.762059 ignition[729]: Ignition finished successfully Dec 13 15:19:45.764340 systemd[1]: Finished ignition-fetch.service. Dec 13 15:19:45.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.766243 systemd[1]: Starting ignition-kargs.service... Dec 13 15:19:45.778805 ignition[735]: Ignition 2.14.0 Dec 13 15:19:45.778825 ignition[735]: Stage: kargs Dec 13 15:19:45.779018 ignition[735]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:45.779053 ignition[735]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:45.780299 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:45.781822 ignition[735]: kargs: kargs passed Dec 13 15:19:45.782852 systemd[1]: Finished ignition-kargs.service. Dec 13 15:19:45.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.781905 ignition[735]: Ignition finished successfully Dec 13 15:19:45.785054 systemd[1]: Starting ignition-disks.service... Dec 13 15:19:45.796762 ignition[740]: Ignition 2.14.0 Dec 13 15:19:45.797752 ignition[740]: Stage: disks Dec 13 15:19:45.798614 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:45.799573 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:45.801042 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:45.803519 ignition[740]: disks: disks passed Dec 13 15:19:45.804357 ignition[740]: Ignition finished successfully Dec 13 15:19:45.806079 systemd[1]: Finished ignition-disks.service. Dec 13 15:19:45.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.806965 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:19:45.808164 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:19:45.809477 systemd[1]: Reached target local-fs.target. Dec 13 15:19:45.810747 systemd[1]: Reached target sysinit.target. Dec 13 15:19:45.811978 systemd[1]: Reached target basic.target. Dec 13 15:19:45.814357 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:19:45.833118 systemd-fsck[747]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 15:19:45.837200 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:19:45.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.839683 systemd[1]: Mounting sysroot.mount... Dec 13 15:19:45.851883 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:19:45.853146 systemd[1]: Mounted sysroot.mount. Dec 13 15:19:45.854570 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:19:45.857388 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:19:45.859459 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 15:19:45.861339 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 15:19:45.862083 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:19:45.862124 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:19:45.864272 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:19:45.868562 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:19:45.877488 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:19:45.889912 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:19:45.906135 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:19:45.914466 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:19:45.981093 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:19:45.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:45.983237 systemd[1]: Starting ignition-mount.service... Dec 13 15:19:45.985356 systemd[1]: Starting sysroot-boot.service... Dec 13 15:19:46.006295 bash[801]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 15:19:46.021830 coreos-metadata[753]: Dec 13 15:19:46.021 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:19:46.023295 ignition[803]: INFO : Ignition 2.14.0 Dec 13 15:19:46.023295 ignition[803]: INFO : Stage: mount Dec 13 15:19:46.023295 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:46.023295 ignition[803]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:46.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:46.029660 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:46.029660 ignition[803]: INFO : mount: mount passed Dec 13 15:19:46.029660 ignition[803]: INFO : Ignition finished successfully Dec 13 15:19:46.026907 systemd[1]: Finished ignition-mount.service. Dec 13 15:19:46.036201 systemd[1]: Finished sysroot-boot.service. Dec 13 15:19:46.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:46.042889 coreos-metadata[753]: Dec 13 15:19:46.041 INFO Fetch successful Dec 13 15:19:46.042889 coreos-metadata[753]: Dec 13 15:19:46.042 INFO wrote hostname srv-fauys.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 15:19:46.045136 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 15:19:46.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:46.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:46.045273 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 15:19:46.338675 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:19:46.350889 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (810) Dec 13 15:19:46.356367 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:19:46.356448 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:19:46.356470 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:19:46.363047 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:19:46.365859 systemd[1]: Starting ignition-files.service... Dec 13 15:19:46.387131 ignition[830]: INFO : Ignition 2.14.0 Dec 13 15:19:46.387131 ignition[830]: INFO : Stage: files Dec 13 15:19:46.388867 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:46.388867 ignition[830]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:46.388867 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:46.392242 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:19:46.394102 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:19:46.395102 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:19:46.399527 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:19:46.400527 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:19:46.401459 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:19:46.401459 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:19:46.400684 unknown[830]: wrote ssh authorized keys file for user: core Dec 13 15:19:46.404632 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 15:19:46.624031 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 15:19:46.853258 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:19:46.854846 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:19:46.863614 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:19:46.863614 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:19:46.863614 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:19:46.863614 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:19:46.863614 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:19:46.863614 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 15:19:47.456787 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 15:19:47.591435 systemd-networkd[710]: eth0: Gained IPv6LL Dec 13 15:19:49.101793 systemd-networkd[710]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:3af:24:19ff:fef4:ebe/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:3af:24:19ff:fef4:ebe/64 assigned by NDisc. Dec 13 15:19:49.101812 systemd-networkd[710]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:19:49.554302 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:19:49.554302 ignition[830]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:19:49.554302 ignition[830]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:19:49.554302 ignition[830]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 15:19:49.559309 ignition[830]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 15:19:49.580777 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 15:19:49.580860 kernel: audit: type=1130 audit(1734103189.570:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.568538 systemd[1]: Finished ignition-files.service. Dec 13 15:19:49.583326 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:19:49.583326 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:19:49.583326 ignition[830]: INFO : files: files passed Dec 13 15:19:49.583326 ignition[830]: INFO : Ignition finished successfully Dec 13 15:19:49.574671 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:19:49.579523 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:19:49.600705 kernel: audit: type=1130 audit(1734103189.590:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.600742 kernel: audit: type=1131 audit(1734103189.590:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.600948 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:19:49.607388 kernel: audit: type=1130 audit(1734103189.600:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.580701 systemd[1]: Starting ignition-quench.service... Dec 13 15:19:49.587573 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:19:49.587726 systemd[1]: Finished ignition-quench.service. Dec 13 15:19:49.591665 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:19:49.601579 systemd[1]: Reached target ignition-complete.target. Dec 13 15:19:49.609435 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:19:49.631288 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:19:49.631446 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:19:49.643220 kernel: audit: type=1130 audit(1734103189.632:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.643280 kernel: audit: type=1131 audit(1734103189.632:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.633123 systemd[1]: Reached target initrd-fs.target. Dec 13 15:19:49.643789 systemd[1]: Reached target initrd.target. Dec 13 15:19:49.645205 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:19:49.646483 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:19:49.663349 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:19:49.671305 kernel: audit: type=1130 audit(1734103189.663:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.665396 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:19:49.679813 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:19:49.680609 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:19:49.681978 systemd[1]: Stopped target timers.target. Dec 13 15:19:49.697494 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:19:49.704119 kernel: audit: type=1131 audit(1734103189.697:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.697675 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:19:49.698968 systemd[1]: Stopped target initrd.target. Dec 13 15:19:49.704817 systemd[1]: Stopped target basic.target. Dec 13 15:19:49.706178 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:19:49.707427 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:19:49.708689 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:19:49.710049 systemd[1]: Stopped target remote-fs.target. Dec 13 15:19:49.711282 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:19:49.712538 systemd[1]: Stopped target sysinit.target. Dec 13 15:19:49.713776 systemd[1]: Stopped target local-fs.target. Dec 13 15:19:49.715044 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:19:49.716215 systemd[1]: Stopped target swap.target. Dec 13 15:19:49.723716 kernel: audit: type=1131 audit(1734103189.717:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.717371 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:19:49.717596 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:19:49.730973 kernel: audit: type=1131 audit(1734103189.724:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.718815 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:19:49.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.724453 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:19:49.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.724693 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:19:49.725948 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:19:49.726184 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:19:49.731926 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:19:49.732165 systemd[1]: Stopped ignition-files.service. Dec 13 15:19:49.734488 systemd[1]: Stopping ignition-mount.service... Dec 13 15:19:49.739970 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:19:49.741016 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:19:49.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.745872 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:19:49.747249 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:19:49.748402 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:19:49.749451 ignition[868]: INFO : Ignition 2.14.0 Dec 13 15:19:49.749451 ignition[868]: INFO : Stage: umount Dec 13 15:19:49.750997 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:19:49.750997 ignition[868]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:19:49.750997 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:19:49.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.756526 ignition[868]: INFO : umount: umount passed Dec 13 15:19:49.756526 ignition[868]: INFO : Ignition finished successfully Dec 13 15:19:49.755090 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:19:49.755353 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:19:49.761569 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:19:49.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.762459 systemd[1]: Stopped ignition-mount.service. Dec 13 15:19:49.767467 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:19:49.769301 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:19:49.769439 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:19:49.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.771287 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:19:49.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.771401 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:19:49.773091 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:19:49.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.773155 systemd[1]: Stopped ignition-disks.service. Dec 13 15:19:49.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.774238 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:19:49.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.774298 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:19:49.775554 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 15:19:49.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.775626 systemd[1]: Stopped ignition-fetch.service. Dec 13 15:19:49.776904 systemd[1]: Stopped target network.target. Dec 13 15:19:49.778191 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:19:49.778260 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:19:49.779530 systemd[1]: Stopped target paths.target. Dec 13 15:19:49.780868 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:19:49.784935 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:19:49.786059 systemd[1]: Stopped target slices.target. Dec 13 15:19:49.787317 systemd[1]: Stopped target sockets.target. Dec 13 15:19:49.788562 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:19:49.788604 systemd[1]: Closed iscsid.socket. Dec 13 15:19:49.789791 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:19:49.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.789918 systemd[1]: Closed iscsiuio.socket. Dec 13 15:19:49.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.791058 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:19:49.791129 systemd[1]: Stopped ignition-setup.service. Dec 13 15:19:49.792316 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:19:49.792383 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:19:49.794311 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:19:49.795141 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:19:49.797908 systemd-networkd[710]: eth0: DHCPv6 lease lost Dec 13 15:19:49.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.799259 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:19:49.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.799433 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:19:49.804000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:19:49.804000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:19:49.802594 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:19:49.802744 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:19:49.804645 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:19:49.804698 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:19:49.806882 systemd[1]: Stopping network-cleanup.service... Dec 13 15:19:49.809888 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:19:49.809969 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:19:49.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.811521 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:19:49.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.811601 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:19:49.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.813148 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:19:49.813211 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:19:49.818864 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:19:49.821384 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:19:49.826452 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:19:49.826677 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:19:49.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.828782 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:19:49.828941 systemd[1]: Stopped network-cleanup.service. Dec 13 15:19:49.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.830397 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:19:49.830451 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:19:49.831489 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:19:49.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.831536 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:19:49.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.832923 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:19:49.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.832980 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:19:49.834255 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:19:49.834314 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:19:49.835584 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:19:49.835640 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:19:49.837899 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:19:49.856625 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:19:49.856756 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:19:49.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.859107 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:19:49.859254 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:19:49.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:49.861637 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:19:49.863473 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:19:49.879521 systemd[1]: Switching root. Dec 13 15:19:49.904230 iscsid[715]: iscsid shutting down. Dec 13 15:19:49.905266 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Dec 13 15:19:49.905335 systemd-journald[201]: Journal stopped Dec 13 15:19:54.014643 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:19:54.014753 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:19:54.014818 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:19:54.014893 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:19:54.014923 kernel: SELinux: policy capability open_perms=1 Dec 13 15:19:54.014949 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:19:54.014977 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:19:54.014996 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:19:54.015015 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:19:54.015033 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:19:54.015052 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:19:54.015078 systemd[1]: Successfully loaded SELinux policy in 59.245ms. Dec 13 15:19:54.015126 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.979ms. Dec 13 15:19:54.015151 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:19:54.015173 systemd[1]: Detected virtualization kvm. Dec 13 15:19:54.015193 systemd[1]: Detected architecture x86-64. Dec 13 15:19:54.015213 systemd[1]: Detected first boot. Dec 13 15:19:54.015239 systemd[1]: Hostname set to . Dec 13 15:19:54.015260 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:19:54.015298 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:19:54.015322 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:19:54.015343 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:19:54.015365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:19:54.015387 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:19:54.015421 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:19:54.015444 systemd[1]: Stopped iscsiuio.service. Dec 13 15:19:54.015472 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 15:19:54.015494 systemd[1]: Stopped iscsid.service. Dec 13 15:19:54.015515 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 15:19:54.015535 systemd[1]: Stopped initrd-switch-root.service. Dec 13 15:19:54.015554 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 15:19:54.015586 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:19:54.015609 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:19:54.015630 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:19:54.015650 systemd[1]: Created slice system-getty.slice. Dec 13 15:19:54.015670 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:19:54.015690 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:19:54.015718 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:19:54.015740 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:19:54.015761 systemd[1]: Created slice user.slice. Dec 13 15:19:54.015804 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:19:54.015828 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:19:54.015869 systemd[1]: Set up automount boot.automount. Dec 13 15:19:54.015892 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:19:54.015913 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 15:19:54.015950 systemd[1]: Stopped target initrd-fs.target. Dec 13 15:19:54.015988 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 15:19:54.016011 systemd[1]: Reached target integritysetup.target. Dec 13 15:19:54.016037 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:19:54.016058 systemd[1]: Reached target remote-fs.target. Dec 13 15:19:54.016078 systemd[1]: Reached target slices.target. Dec 13 15:19:54.016098 systemd[1]: Reached target swap.target. Dec 13 15:19:54.016118 systemd[1]: Reached target torcx.target. Dec 13 15:19:54.016139 systemd[1]: Reached target veritysetup.target. Dec 13 15:19:54.016158 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:19:54.016179 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:19:54.016211 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:19:54.016233 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:19:54.016254 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:19:54.016273 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:19:54.016293 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:19:54.016313 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:19:54.016333 systemd[1]: Mounting media.mount... Dec 13 15:19:54.016353 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:19:54.016373 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:19:54.016408 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:19:54.016444 systemd[1]: Mounting tmp.mount... Dec 13 15:19:54.016466 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:19:54.016486 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:19:54.016506 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:19:54.016526 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:19:54.016546 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:19:54.016573 systemd[1]: Starting modprobe@drm.service... Dec 13 15:19:54.016595 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:19:54.016627 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:19:54.016650 systemd[1]: Starting modprobe@loop.service... Dec 13 15:19:54.016671 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:19:54.016692 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 15:19:54.016712 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 15:19:54.016732 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 15:19:54.016752 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 15:19:54.016780 systemd[1]: Stopped systemd-journald.service. Dec 13 15:19:54.018784 systemd[1]: Starting systemd-journald.service... Dec 13 15:19:54.018825 kernel: loop: module loaded Dec 13 15:19:54.018876 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:19:54.018899 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:19:54.018919 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:19:54.018939 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:19:54.018959 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 15:19:54.018999 systemd[1]: Stopped verity-setup.service. Dec 13 15:19:54.019022 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:19:54.019042 kernel: fuse: init (API version 7.34) Dec 13 15:19:54.019075 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:19:54.019097 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:19:54.019117 systemd[1]: Mounted media.mount. Dec 13 15:19:54.019137 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:19:54.019157 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:19:54.019178 systemd[1]: Mounted tmp.mount. Dec 13 15:19:54.019203 systemd-journald[987]: Journal started Dec 13 15:19:54.019292 systemd-journald[987]: Runtime Journal (/run/log/journal/32298001303844ee9da11057d57b04ec) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:19:50.078000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 15:19:50.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:19:50.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:19:50.162000 audit: BPF prog-id=10 op=LOAD Dec 13 15:19:50.162000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:19:50.162000 audit: BPF prog-id=11 op=LOAD Dec 13 15:19:50.162000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:19:50.379000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 15:19:50.379000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:19:50.379000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:19:50.382000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 15:19:50.382000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:19:50.382000 audit: CWD cwd="/" Dec 13 15:19:50.382000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:50.382000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:50.382000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:19:53.741000 audit: BPF prog-id=12 op=LOAD Dec 13 15:19:53.741000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:19:53.741000 audit: BPF prog-id=13 op=LOAD Dec 13 15:19:53.741000 audit: BPF prog-id=14 op=LOAD Dec 13 15:19:53.741000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:19:53.741000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:19:53.744000 audit: BPF prog-id=15 op=LOAD Dec 13 15:19:53.744000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:19:53.745000 audit: BPF prog-id=16 op=LOAD Dec 13 15:19:53.745000 audit: BPF prog-id=17 op=LOAD Dec 13 15:19:53.745000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:19:53.745000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:19:53.747000 audit: BPF prog-id=18 op=LOAD Dec 13 15:19:53.747000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:19:53.747000 audit: BPF prog-id=19 op=LOAD Dec 13 15:19:53.747000 audit: BPF prog-id=20 op=LOAD Dec 13 15:19:53.747000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:19:53.747000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:19:53.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.760000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:19:54.023590 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:19:54.023625 systemd[1]: Started systemd-journald.service. Dec 13 15:19:53.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.939000 audit: BPF prog-id=21 op=LOAD Dec 13 15:19:53.940000 audit: BPF prog-id=22 op=LOAD Dec 13 15:19:53.940000 audit: BPF prog-id=23 op=LOAD Dec 13 15:19:53.940000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:19:53.940000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:19:53.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.006000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:19:54.006000 audit[987]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff7c586040 a2=4000 a3=7fff7c5860dc items=0 ppid=1 pid=987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:19:54.006000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:19:54.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:53.739114 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:19:54.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:50.377186 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:19:53.739151 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 15:19:50.377932 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:19:53.749377 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 15:19:50.377972 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:19:54.024732 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:19:50.378028 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 15:19:54.025783 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:19:50.378047 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 15:19:50.378113 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 15:19:50.378136 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 15:19:50.378494 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 15:19:50.378569 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:19:50.378598 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:19:50.379434 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 15:19:50.379500 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 15:19:50.379535 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 15:19:50.379564 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 15:19:50.379597 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 15:19:50.379624 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 15:19:53.170271 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:53Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:19:53.171099 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:53Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:19:53.171994 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:53Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:19:53.172464 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:53Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:19:53.172573 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:53Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 15:19:53.172744 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-12-13T15:19:53Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 15:19:54.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.031031 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:19:54.032936 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:19:54.033145 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:19:54.034196 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:19:54.034947 systemd[1]: Finished modprobe@drm.service. Dec 13 15:19:54.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.035973 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:19:54.036173 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:19:54.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.037271 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:19:54.037471 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:19:54.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.038594 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:19:54.038825 systemd[1]: Finished modprobe@loop.service. Dec 13 15:19:54.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.039937 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:19:54.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.040958 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:19:54.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.042124 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:19:54.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.043524 systemd[1]: Reached target network-pre.target. Dec 13 15:19:54.046147 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:19:54.052140 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:19:54.055483 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:19:54.058562 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:19:54.065066 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:19:54.065815 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:19:54.069041 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:19:54.069767 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:19:54.072005 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:19:54.074463 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:19:54.081352 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:19:54.083167 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:19:54.088657 systemd-journald[987]: Time spent on flushing to /var/log/journal/32298001303844ee9da11057d57b04ec is 64.873ms for 1293 entries. Dec 13 15:19:54.088657 systemd-journald[987]: System Journal (/var/log/journal/32298001303844ee9da11057d57b04ec) is 8.0M, max 584.8M, 576.8M free. Dec 13 15:19:54.179215 systemd-journald[987]: Received client request to flush runtime journal. Dec 13 15:19:54.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.108455 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:19:54.109603 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:19:54.110379 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:19:54.137298 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:19:54.180809 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:19:54.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.186214 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:19:54.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.188618 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:19:54.200591 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 15:19:54.710934 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:19:54.718532 kernel: kauditd_printk_skb: 106 callbacks suppressed Dec 13 15:19:54.718653 kernel: audit: type=1130 audit(1734103194.710:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.720614 kernel: audit: type=1334 audit(1734103194.717:146): prog-id=24 op=LOAD Dec 13 15:19:54.717000 audit: BPF prog-id=24 op=LOAD Dec 13 15:19:54.719634 systemd[1]: Starting systemd-udevd.service... Dec 13 15:19:54.717000 audit: BPF prog-id=25 op=LOAD Dec 13 15:19:54.717000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:19:54.717000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:19:54.723139 kernel: audit: type=1334 audit(1734103194.717:147): prog-id=25 op=LOAD Dec 13 15:19:54.723207 kernel: audit: type=1334 audit(1734103194.717:148): prog-id=7 op=UNLOAD Dec 13 15:19:54.723251 kernel: audit: type=1334 audit(1734103194.717:149): prog-id=8 op=UNLOAD Dec 13 15:19:54.750452 systemd-udevd[1012]: Using default interface naming scheme 'v252'. Dec 13 15:19:54.783595 systemd[1]: Started systemd-udevd.service. Dec 13 15:19:54.795348 kernel: audit: type=1130 audit(1734103194.783:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.796149 systemd[1]: Starting systemd-networkd.service... Dec 13 15:19:54.793000 audit: BPF prog-id=26 op=LOAD Dec 13 15:19:54.800868 kernel: audit: type=1334 audit(1734103194.793:151): prog-id=26 op=LOAD Dec 13 15:19:54.812923 kernel: audit: type=1334 audit(1734103194.805:152): prog-id=27 op=LOAD Dec 13 15:19:54.813032 kernel: audit: type=1334 audit(1734103194.805:153): prog-id=28 op=LOAD Dec 13 15:19:54.805000 audit: BPF prog-id=27 op=LOAD Dec 13 15:19:54.805000 audit: BPF prog-id=28 op=LOAD Dec 13 15:19:54.811403 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:19:54.816090 kernel: audit: type=1334 audit(1734103194.805:154): prog-id=29 op=LOAD Dec 13 15:19:54.805000 audit: BPF prog-id=29 op=LOAD Dec 13 15:19:54.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.869202 systemd[1]: Started systemd-userdbd.service. Dec 13 15:19:54.956273 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 15:19:54.983864 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Dec 13 15:19:54.990119 systemd-networkd[1025]: lo: Link UP Dec 13 15:19:54.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:54.990132 systemd-networkd[1025]: lo: Gained carrier Dec 13 15:19:54.991005 systemd-networkd[1025]: Enumeration completed Dec 13 15:19:54.991143 systemd[1]: Started systemd-networkd.service. Dec 13 15:19:54.999989 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:19:55.017871 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:19:55.064000 audit[1024]: AVC avc: denied { confidentiality } for pid=1024 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:19:55.064000 audit[1024]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cfa331d430 a1=337fc a2=7f6e27889bc5 a3=5 items=110 ppid=1012 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:19:55.064000 audit: CWD cwd="/" Dec 13 15:19:55.064000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=1 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=2 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=3 name=(null) inode=15299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=4 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=5 name=(null) inode=15300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=6 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=7 name=(null) inode=15301 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=8 name=(null) inode=15301 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=9 name=(null) inode=15302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=10 name=(null) inode=15301 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=11 name=(null) inode=15303 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=12 name=(null) inode=15301 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=13 name=(null) inode=15304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=14 name=(null) inode=15301 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=15 name=(null) inode=15305 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=16 name=(null) inode=15301 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=17 name=(null) inode=15306 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=18 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=19 name=(null) inode=15307 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=20 name=(null) inode=15307 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=21 name=(null) inode=15308 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=22 name=(null) inode=15307 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=23 name=(null) inode=15309 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=24 name=(null) inode=15307 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=25 name=(null) inode=15310 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=26 name=(null) inode=15307 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=27 name=(null) inode=15311 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=28 name=(null) inode=15307 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=29 name=(null) inode=15312 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=30 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=31 name=(null) inode=15313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=32 name=(null) inode=15313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=33 name=(null) inode=15314 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=34 name=(null) inode=15313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=35 name=(null) inode=15315 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=36 name=(null) inode=15313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=37 name=(null) inode=15316 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=38 name=(null) inode=15313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=39 name=(null) inode=15317 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=40 name=(null) inode=15313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=41 name=(null) inode=15318 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=42 name=(null) inode=15298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=43 name=(null) inode=15319 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=44 name=(null) inode=15319 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.085883 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 15:19:55.134533 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 15:19:55.134899 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 15:19:55.135116 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Dec 13 15:19:55.064000 audit: PATH item=45 name=(null) inode=15320 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=46 name=(null) inode=15319 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=47 name=(null) inode=15321 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=48 name=(null) inode=15319 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=49 name=(null) inode=15322 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=50 name=(null) inode=15319 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=51 name=(null) inode=15323 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=52 name=(null) inode=15319 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=53 name=(null) inode=15324 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=55 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=56 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=57 name=(null) inode=15326 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=58 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=59 name=(null) inode=15327 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=60 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=61 name=(null) inode=15328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=62 name=(null) inode=15328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=63 name=(null) inode=15329 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=64 name=(null) inode=15328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=65 name=(null) inode=15330 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=66 name=(null) inode=15328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=67 name=(null) inode=15331 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=68 name=(null) inode=15328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=69 name=(null) inode=15332 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=70 name=(null) inode=15328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=71 name=(null) inode=15333 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=72 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=73 name=(null) inode=15334 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=74 name=(null) inode=15334 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=75 name=(null) inode=15335 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=76 name=(null) inode=15334 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=77 name=(null) inode=15336 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=78 name=(null) inode=15334 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=79 name=(null) inode=15337 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=80 name=(null) inode=15334 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=81 name=(null) inode=15338 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=82 name=(null) inode=15334 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=83 name=(null) inode=15339 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=84 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=85 name=(null) inode=15340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=86 name=(null) inode=15340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=87 name=(null) inode=15341 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=88 name=(null) inode=15340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=89 name=(null) inode=15342 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=90 name=(null) inode=15340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=91 name=(null) inode=15343 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=92 name=(null) inode=15340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=93 name=(null) inode=15344 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=94 name=(null) inode=15340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=95 name=(null) inode=15345 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=96 name=(null) inode=15325 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=97 name=(null) inode=15346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=98 name=(null) inode=15346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=99 name=(null) inode=15347 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=100 name=(null) inode=15346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=101 name=(null) inode=15348 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=102 name=(null) inode=15346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=103 name=(null) inode=15349 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=104 name=(null) inode=15346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=105 name=(null) inode=15350 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=106 name=(null) inode=15346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=107 name=(null) inode=15351 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PATH item=109 name=(null) inode=15352 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:19:55.064000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:19:55.081186 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:19:55.145001 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:19:55.146349 systemd-networkd[1025]: eth0: Link UP Dec 13 15:19:55.146363 systemd-networkd[1025]: eth0: Gained carrier Dec 13 15:19:55.200107 systemd-networkd[1025]: eth0: DHCPv4 address 10.244.14.190/30, gateway 10.244.14.189 acquired from 10.244.14.189 Dec 13 15:19:55.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.282538 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:19:55.285108 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:19:55.308071 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:19:55.342404 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:19:55.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.343366 systemd[1]: Reached target cryptsetup.target. Dec 13 15:19:55.345933 systemd[1]: Starting lvm2-activation.service... Dec 13 15:19:55.351789 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:19:55.380302 systemd[1]: Finished lvm2-activation.service. Dec 13 15:19:55.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.383043 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:19:55.383710 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:19:55.383795 systemd[1]: Reached target local-fs.target. Dec 13 15:19:55.384483 systemd[1]: Reached target machines.target. Dec 13 15:19:55.387353 systemd[1]: Starting ldconfig.service... Dec 13 15:19:55.388832 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:19:55.388920 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:19:55.390807 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:19:55.394035 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:19:55.400010 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:19:55.403133 systemd[1]: Starting systemd-sysext.service... Dec 13 15:19:55.404570 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1044 (bootctl) Dec 13 15:19:55.407614 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:19:55.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.454784 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:19:55.462918 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:19:55.468216 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:19:55.469462 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:19:55.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.474290 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:19:55.474522 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:19:55.491996 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 15:19:55.522866 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:19:55.546867 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 15:19:55.555161 systemd-fsck[1052]: fsck.fat 4.2 (2021-01-31) Dec 13 15:19:55.555161 systemd-fsck[1052]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 15:19:55.558741 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:19:55.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.561661 systemd[1]: Mounting boot.mount... Dec 13 15:19:55.575112 (sd-sysext)[1056]: Using extensions 'kubernetes'. Dec 13 15:19:55.576912 (sd-sysext)[1056]: Merged extensions into '/usr'. Dec 13 15:19:55.598210 systemd[1]: Mounted boot.mount. Dec 13 15:19:55.606421 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:19:55.609409 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:19:55.610374 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:19:55.613710 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:19:55.619512 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:19:55.624310 systemd[1]: Starting modprobe@loop.service... Dec 13 15:19:55.627209 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:19:55.627649 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:19:55.628609 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:19:55.633924 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:19:55.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.635128 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:19:55.636575 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:19:55.636777 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:19:55.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.638116 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:19:55.638315 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:19:55.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.639541 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:19:55.639720 systemd[1]: Finished modprobe@loop.service. Dec 13 15:19:55.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.642028 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:19:55.642150 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:19:55.643627 systemd[1]: Finished systemd-sysext.service. Dec 13 15:19:55.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:55.647605 systemd[1]: Starting ensure-sysext.service... Dec 13 15:19:55.649793 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:19:55.664005 systemd[1]: Reloading. Dec 13 15:19:55.675435 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:19:55.686635 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:19:55.702463 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:19:55.782461 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2024-12-13T15:19:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:19:55.782509 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2024-12-13T15:19:55Z" level=info msg="torcx already run" Dec 13 15:19:55.901431 ldconfig[1043]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:19:55.936521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:19:55.936553 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:19:55.964290 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:19:56.048000 audit: BPF prog-id=30 op=LOAD Dec 13 15:19:56.048000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:19:56.048000 audit: BPF prog-id=31 op=LOAD Dec 13 15:19:56.048000 audit: BPF prog-id=32 op=LOAD Dec 13 15:19:56.048000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:19:56.048000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:19:56.050000 audit: BPF prog-id=33 op=LOAD Dec 13 15:19:56.050000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:19:56.052000 audit: BPF prog-id=34 op=LOAD Dec 13 15:19:56.052000 audit: BPF prog-id=35 op=LOAD Dec 13 15:19:56.052000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:19:56.052000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:19:56.053000 audit: BPF prog-id=36 op=LOAD Dec 13 15:19:56.053000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:19:56.058000 audit: BPF prog-id=37 op=LOAD Dec 13 15:19:56.058000 audit: BPF prog-id=38 op=LOAD Dec 13 15:19:56.058000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:19:56.058000 audit: BPF prog-id=29 op=UNLOAD Dec 13 15:19:56.074385 systemd[1]: Finished ldconfig.service. Dec 13 15:19:56.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.077121 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:19:56.087062 systemd[1]: Starting audit-rules.service... Dec 13 15:19:56.089995 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:19:56.094183 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:19:56.096000 audit: BPF prog-id=39 op=LOAD Dec 13 15:19:56.098774 systemd[1]: Starting systemd-resolved.service... Dec 13 15:19:56.102000 audit: BPF prog-id=40 op=LOAD Dec 13 15:19:56.105260 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:19:56.110384 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:19:56.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.112815 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:19:56.119000 audit[1137]: SYSTEM_BOOT pid=1137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.116825 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:19:56.124411 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.127690 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:19:56.131644 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:19:56.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.135675 systemd[1]: Starting modprobe@loop.service... Dec 13 15:19:56.136472 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.136780 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:19:56.137105 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:19:56.140563 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:19:56.140810 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:19:56.142772 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:19:56.142968 systemd[1]: Finished modprobe@loop.service. Dec 13 15:19:56.150332 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:19:56.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.155232 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:19:56.155516 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:19:56.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.157728 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.160150 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:19:56.163431 systemd[1]: Starting modprobe@drm.service... Dec 13 15:19:56.166481 systemd[1]: Starting modprobe@loop.service... Dec 13 15:19:56.168410 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.168638 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:19:56.170713 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:19:56.172785 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:19:56.173098 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:19:56.175006 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:19:56.175634 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:19:56.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.180209 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:19:56.180417 systemd[1]: Finished modprobe@drm.service. Dec 13 15:19:56.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.181631 systemd[1]: Finished ensure-sysext.service. Dec 13 15:19:56.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.184216 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:19:56.184411 systemd[1]: Finished modprobe@loop.service. Dec 13 15:19:56.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.185454 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.186229 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:19:56.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.189179 systemd[1]: Starting systemd-update-done.service... Dec 13 15:19:56.202722 systemd[1]: Finished systemd-update-done.service. Dec 13 15:19:56.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:19:56.239000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:19:56.239000 audit[1159]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd2ad0c960 a2=420 a3=0 items=0 ppid=1131 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:19:56.239000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:19:56.241091 augenrules[1159]: No rules Dec 13 15:19:56.241458 systemd[1]: Finished audit-rules.service. Dec 13 15:19:56.257873 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:19:56.258747 systemd[1]: Reached target time-set.target. Dec 13 15:19:56.264781 systemd-resolved[1134]: Positive Trust Anchors: Dec 13 15:19:56.265187 systemd-resolved[1134]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:19:56.265361 systemd-resolved[1134]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:19:56.273371 systemd-resolved[1134]: Using system hostname 'srv-fauys.gb1.brightbox.com'. Dec 13 15:19:56.276168 systemd[1]: Started systemd-resolved.service. Dec 13 15:19:56.277000 systemd[1]: Reached target network.target. Dec 13 15:19:56.277615 systemd[1]: Reached target nss-lookup.target. Dec 13 15:19:56.278297 systemd[1]: Reached target sysinit.target. Dec 13 15:19:56.279092 systemd[1]: Started motdgen.path. Dec 13 15:19:56.279743 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:19:56.280747 systemd[1]: Started logrotate.timer. Dec 13 15:19:56.281515 systemd[1]: Started mdadm.timer. Dec 13 15:19:56.282145 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:19:56.282801 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:19:56.282867 systemd[1]: Reached target paths.target. Dec 13 15:19:56.283470 systemd[1]: Reached target timers.target. Dec 13 15:19:56.284540 systemd[1]: Listening on dbus.socket. Dec 13 15:19:56.287032 systemd[1]: Starting docker.socket... Dec 13 15:19:56.291601 systemd[1]: Listening on sshd.socket. Dec 13 15:19:56.292451 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:19:56.293131 systemd[1]: Listening on docker.socket. Dec 13 15:19:56.293947 systemd[1]: Reached target sockets.target. Dec 13 15:19:56.294570 systemd[1]: Reached target basic.target. Dec 13 15:19:56.295333 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.295388 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:19:56.297074 systemd[1]: Starting containerd.service... Dec 13 15:19:56.300341 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:19:56.303175 systemd[1]: Starting dbus.service... Dec 13 15:19:56.310322 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:19:56.314445 systemd[1]: Starting extend-filesystems.service... Dec 13 15:19:56.318030 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:19:56.319673 systemd[1]: Starting motdgen.service... Dec 13 15:19:56.323609 systemd[1]: Starting prepare-helm.service... Dec 13 15:19:56.329088 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:19:56.334120 systemd[1]: Starting sshd-keygen.service... Dec 13 15:19:56.338783 systemd[1]: Starting systemd-logind.service... Dec 13 15:19:56.339961 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:19:56.340096 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 15:19:56.342427 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 15:19:56.343684 systemd[1]: Starting update-engine.service... Dec 13 15:19:56.363049 jq[1172]: false Dec 13 15:19:56.366612 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:19:56.371790 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:19:56.374124 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:19:56.375971 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:19:56.376247 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:19:56.394782 jq[1188]: true Dec 13 15:19:56.404710 tar[1190]: linux-amd64/helm Dec 13 15:19:56.408473 dbus-daemon[1169]: [system] SELinux support is enabled Dec 13 15:19:56.409047 systemd[1]: Started dbus.service. Dec 13 15:19:56.412685 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:19:56.412760 systemd[1]: Reached target system-config.target. Dec 13 15:19:56.413457 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:19:56.413492 systemd[1]: Reached target user-config.target. Dec 13 15:19:56.422067 jq[1196]: true Dec 13 15:19:56.422881 dbus-daemon[1169]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1025 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 15:19:56.432719 dbus-daemon[1169]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 15:19:56.440563 extend-filesystems[1173]: Found loop1 Dec 13 15:19:56.440554 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:19:56.440793 systemd[1]: Finished motdgen.service. Dec 13 15:19:56.445141 extend-filesystems[1173]: Found vda Dec 13 15:19:56.446028 extend-filesystems[1173]: Found vda1 Dec 13 15:19:56.447485 systemd[1]: Starting systemd-hostnamed.service... Dec 13 15:19:56.455500 extend-filesystems[1173]: Found vda2 Dec 13 15:19:56.455500 extend-filesystems[1173]: Found vda3 Dec 13 15:19:56.455500 extend-filesystems[1173]: Found usr Dec 13 15:19:56.455500 extend-filesystems[1173]: Found vda4 Dec 13 15:19:56.455500 extend-filesystems[1173]: Found vda6 Dec 13 15:19:56.455500 extend-filesystems[1173]: Found vda7 Dec 13 15:19:56.455500 extend-filesystems[1173]: Found vda9 Dec 13 15:19:56.455500 extend-filesystems[1173]: Checking size of /dev/vda9 Dec 13 15:19:57.337361 systemd-resolved[1134]: Clock change detected. Flushing caches. Dec 13 15:19:57.337781 systemd-timesyncd[1135]: Contacted time server 77.68.81.77:123 (0.flatcar.pool.ntp.org). Dec 13 15:19:57.337945 systemd-timesyncd[1135]: Initial clock synchronization to Fri 2024-12-13 15:19:57.337294 UTC. Dec 13 15:19:57.344915 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:19:57.344991 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:19:57.386902 extend-filesystems[1173]: Resized partition /dev/vda9 Dec 13 15:19:57.398408 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:19:57.408247 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 15:19:57.410329 update_engine[1181]: I1213 15:19:57.408511 1181 main.cc:92] Flatcar Update Engine starting Dec 13 15:19:57.415525 systemd[1]: Started update-engine.service. Dec 13 15:19:57.415911 update_engine[1181]: I1213 15:19:57.415597 1181 update_check_scheduler.cc:74] Next update check in 10m4s Dec 13 15:19:57.419067 systemd[1]: Started locksmithd.service. Dec 13 15:19:57.470587 env[1191]: time="2024-12-13T15:19:57.470457853Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:19:57.473402 bash[1220]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:19:57.474403 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:19:57.492047 systemd-logind[1180]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 15:19:57.492102 systemd-logind[1180]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 15:19:57.495096 systemd-logind[1180]: New seat seat0. Dec 13 15:19:57.501005 systemd[1]: Started systemd-logind.service. Dec 13 15:19:57.543626 dbus-daemon[1169]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 15:19:57.543811 systemd[1]: Started systemd-hostnamed.service. Dec 13 15:19:57.546795 dbus-daemon[1169]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1201 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 15:19:57.550397 systemd[1]: Starting polkit.service... Dec 13 15:19:57.569253 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 15:19:57.580552 polkitd[1228]: Started polkitd version 121 Dec 13 15:19:57.585956 env[1191]: time="2024-12-13T15:19:57.583526889Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:19:57.589532 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 15:19:57.589532 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 15:19:57.589532 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 15:19:57.601434 extend-filesystems[1173]: Resized filesystem in /dev/vda9 Dec 13 15:19:57.589878 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:19:57.603382 env[1191]: time="2024-12-13T15:19:57.602417639Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:19:57.590148 systemd[1]: Finished extend-filesystems.service. Dec 13 15:19:57.605465 polkitd[1228]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 15:19:57.605581 polkitd[1228]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 15:19:57.607476 polkitd[1228]: Finished loading, compiling and executing 2 rules Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615066947Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615158492Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615604657Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615634961Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615674735Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615696619Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.615864420Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.616470462Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.616707947Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:19:57.617351 env[1191]: time="2024-12-13T15:19:57.616755698Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:19:57.611723 systemd[1]: Started polkit.service. Dec 13 15:19:57.608058 dbus-daemon[1169]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 15:19:57.619366 env[1191]: time="2024-12-13T15:19:57.616862629Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:19:57.619366 env[1191]: time="2024-12-13T15:19:57.616886695Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:19:57.613806 systemd[1]: Created slice system-sshd.slice. Dec 13 15:19:57.608644 polkitd[1228]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 15:19:57.619203 systemd-networkd[1025]: eth0: Gained IPv6LL Dec 13 15:19:57.622968 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:19:57.624064 systemd[1]: Reached target network-online.target. Dec 13 15:19:57.627419 systemd[1]: Starting kubelet.service... Dec 13 15:19:57.635474 systemd-hostnamed[1201]: Hostname set to (static) Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641354916Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641426660Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641453844Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641590221Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641738962Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641769056Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641820112Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641846880Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641869051Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641907145Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.641940458Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.642001421Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.642248842Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:19:57.647252 env[1191]: time="2024-12-13T15:19:57.642463288Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643074374Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643165934Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643192379Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643463687Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643489800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643516067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643559773Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643590585Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643625254Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643655712Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643673405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.643711425Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.644032116Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.644081074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.647964 env[1191]: time="2024-12-13T15:19:57.644114250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.649887 env[1191]: time="2024-12-13T15:19:57.644159282Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:19:57.649887 env[1191]: time="2024-12-13T15:19:57.644184582Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:19:57.649887 env[1191]: time="2024-12-13T15:19:57.644225236Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:19:57.649887 env[1191]: time="2024-12-13T15:19:57.644311215Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:19:57.649887 env[1191]: time="2024-12-13T15:19:57.644396857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:19:57.650121 env[1191]: time="2024-12-13T15:19:57.644738085Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:19:57.650121 env[1191]: time="2024-12-13T15:19:57.644846150Z" level=info msg="Connect containerd service" Dec 13 15:19:57.650121 env[1191]: time="2024-12-13T15:19:57.644930429Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.655816810Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.655970648Z" level=info msg="Start subscribing containerd event" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656047995Z" level=info msg="Start recovering state" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656184445Z" level=info msg="Start event monitor" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656239953Z" level=info msg="Start snapshots syncer" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656261282Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656275278Z" level=info msg="Start streaming server" Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656416610Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.656518956Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:19:57.659712 env[1191]: time="2024-12-13T15:19:57.658015066Z" level=info msg="containerd successfully booted in 0.206329s" Dec 13 15:19:57.656792 systemd[1]: Started containerd.service. Dec 13 15:19:58.263742 locksmithd[1224]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:19:58.476530 tar[1190]: linux-amd64/LICENSE Dec 13 15:19:58.478260 tar[1190]: linux-amd64/README.md Dec 13 15:19:58.486096 systemd[1]: Finished prepare-helm.service. Dec 13 15:19:58.771753 systemd[1]: Started kubelet.service. Dec 13 15:19:58.950098 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:19:58.981914 systemd[1]: Finished sshd-keygen.service. Dec 13 15:19:58.985445 systemd[1]: Starting issuegen.service... Dec 13 15:19:58.988103 systemd[1]: Started sshd@0-10.244.14.190:22-139.178.68.195:45736.service. Dec 13 15:19:59.004385 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:19:59.004645 systemd[1]: Finished issuegen.service. Dec 13 15:19:59.007857 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:19:59.021559 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:19:59.025041 systemd[1]: Started getty@tty1.service. Dec 13 15:19:59.031010 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 15:19:59.032253 systemd[1]: Reached target getty.target. Dec 13 15:19:59.129988 systemd-networkd[1025]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:3af:24:19ff:fef4:ebe/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:3af:24:19ff:fef4:ebe/64 assigned by NDisc. Dec 13 15:19:59.130002 systemd-networkd[1025]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:19:59.516439 kubelet[1249]: E1213 15:19:59.516092 1249 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:19:59.519282 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:19:59.519551 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:19:59.519983 systemd[1]: kubelet.service: Consumed 1.113s CPU time. Dec 13 15:19:59.917703 sshd[1263]: Accepted publickey for core from 139.178.68.195 port 45736 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:19:59.920785 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:19:59.939137 systemd[1]: Created slice user-500.slice. Dec 13 15:19:59.942232 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:19:59.948334 systemd-logind[1180]: New session 1 of user core. Dec 13 15:19:59.958369 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:19:59.962683 systemd[1]: Starting user@500.service... Dec 13 15:19:59.967992 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:00.070948 systemd[1272]: Queued start job for default target default.target. Dec 13 15:20:00.071896 systemd[1272]: Reached target paths.target. Dec 13 15:20:00.071933 systemd[1272]: Reached target sockets.target. Dec 13 15:20:00.071955 systemd[1272]: Reached target timers.target. Dec 13 15:20:00.071974 systemd[1272]: Reached target basic.target. Dec 13 15:20:00.072152 systemd[1]: Started user@500.service. Dec 13 15:20:00.074078 systemd[1272]: Reached target default.target. Dec 13 15:20:00.074149 systemd[1272]: Startup finished in 96ms. Dec 13 15:20:00.074308 systemd[1]: Started session-1.scope. Dec 13 15:20:00.703450 systemd[1]: Started sshd@1-10.244.14.190:22-139.178.68.195:45738.service. Dec 13 15:20:01.603099 sshd[1282]: Accepted publickey for core from 139.178.68.195 port 45738 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:01.606071 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:01.614208 systemd-logind[1180]: New session 2 of user core. Dec 13 15:20:01.614324 systemd[1]: Started session-2.scope. Dec 13 15:20:02.225726 sshd[1282]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:02.230171 systemd[1]: sshd@1-10.244.14.190:22-139.178.68.195:45738.service: Deactivated successfully. Dec 13 15:20:02.230711 systemd-logind[1180]: Session 2 logged out. Waiting for processes to exit. Dec 13 15:20:02.231138 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 15:20:02.233013 systemd-logind[1180]: Removed session 2. Dec 13 15:20:02.372098 systemd[1]: Started sshd@2-10.244.14.190:22-139.178.68.195:45740.service. Dec 13 15:20:03.259398 sshd[1288]: Accepted publickey for core from 139.178.68.195 port 45740 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:03.261350 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:03.267850 systemd-logind[1180]: New session 3 of user core. Dec 13 15:20:03.268567 systemd[1]: Started session-3.scope. Dec 13 15:20:03.877106 sshd[1288]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:03.881086 systemd-logind[1180]: Session 3 logged out. Waiting for processes to exit. Dec 13 15:20:03.881548 systemd[1]: sshd@2-10.244.14.190:22-139.178.68.195:45740.service: Deactivated successfully. Dec 13 15:20:03.882447 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 15:20:03.884585 systemd-logind[1180]: Removed session 3. Dec 13 15:20:04.365126 coreos-metadata[1168]: Dec 13 15:20:04.364 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:20:04.418441 coreos-metadata[1168]: Dec 13 15:20:04.418 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 15:20:04.446737 coreos-metadata[1168]: Dec 13 15:20:04.446 INFO Fetch successful Dec 13 15:20:04.447127 coreos-metadata[1168]: Dec 13 15:20:04.447 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 15:20:04.476917 coreos-metadata[1168]: Dec 13 15:20:04.476 INFO Fetch successful Dec 13 15:20:04.479015 unknown[1168]: wrote ssh authorized keys file for user: core Dec 13 15:20:04.490334 update-ssh-keys[1295]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:20:04.491390 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:20:04.491931 systemd[1]: Reached target multi-user.target. Dec 13 15:20:04.494602 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:20:04.504786 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:20:04.505059 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:20:04.508331 systemd[1]: Startup finished in 1.144s (kernel) + 7.319s (initrd) + 13.627s (userspace) = 22.091s. Dec 13 15:20:09.713404 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:20:09.713718 systemd[1]: Stopped kubelet.service. Dec 13 15:20:09.713794 systemd[1]: kubelet.service: Consumed 1.113s CPU time. Dec 13 15:20:09.716019 systemd[1]: Starting kubelet.service... Dec 13 15:20:09.890734 systemd[1]: Started kubelet.service. Dec 13 15:20:09.971288 kubelet[1301]: E1213 15:20:09.970784 1301 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:20:09.975351 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:20:09.975579 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:20:14.033787 systemd[1]: Started sshd@3-10.244.14.190:22-139.178.68.195:45780.service. Dec 13 15:20:14.927279 sshd[1308]: Accepted publickey for core from 139.178.68.195 port 45780 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:14.930093 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:14.937127 systemd-logind[1180]: New session 4 of user core. Dec 13 15:20:14.938329 systemd[1]: Started session-4.scope. Dec 13 15:20:15.547684 sshd[1308]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:15.551632 systemd[1]: sshd@3-10.244.14.190:22-139.178.68.195:45780.service: Deactivated successfully. Dec 13 15:20:15.552662 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:20:15.553532 systemd-logind[1180]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:20:15.555021 systemd-logind[1180]: Removed session 4. Dec 13 15:20:15.694112 systemd[1]: Started sshd@4-10.244.14.190:22-139.178.68.195:45794.service. Dec 13 15:20:16.579098 sshd[1314]: Accepted publickey for core from 139.178.68.195 port 45794 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:16.581075 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:16.588518 systemd[1]: Started session-5.scope. Dec 13 15:20:16.589154 systemd-logind[1180]: New session 5 of user core. Dec 13 15:20:17.189119 sshd[1314]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:17.192584 systemd[1]: sshd@4-10.244.14.190:22-139.178.68.195:45794.service: Deactivated successfully. Dec 13 15:20:17.193554 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:20:17.194473 systemd-logind[1180]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:20:17.196027 systemd-logind[1180]: Removed session 5. Dec 13 15:20:17.336411 systemd[1]: Started sshd@5-10.244.14.190:22-139.178.68.195:42996.service. Dec 13 15:20:18.235157 sshd[1320]: Accepted publickey for core from 139.178.68.195 port 42996 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:18.237714 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:18.244707 systemd[1]: Started session-6.scope. Dec 13 15:20:18.246317 systemd-logind[1180]: New session 6 of user core. Dec 13 15:20:18.853829 sshd[1320]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:18.858637 systemd[1]: sshd@5-10.244.14.190:22-139.178.68.195:42996.service: Deactivated successfully. Dec 13 15:20:18.859851 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:20:18.860762 systemd-logind[1180]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:20:18.862171 systemd-logind[1180]: Removed session 6. Dec 13 15:20:19.000232 systemd[1]: Started sshd@6-10.244.14.190:22-139.178.68.195:43000.service. Dec 13 15:20:19.891730 sshd[1326]: Accepted publickey for core from 139.178.68.195 port 43000 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:19.893795 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:19.900857 systemd-logind[1180]: New session 7 of user core. Dec 13 15:20:19.901789 systemd[1]: Started session-7.scope. Dec 13 15:20:20.213377 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:20:20.213681 systemd[1]: Stopped kubelet.service. Dec 13 15:20:20.216356 systemd[1]: Starting kubelet.service... Dec 13 15:20:20.337847 systemd[1]: Started kubelet.service. Dec 13 15:20:20.406356 kubelet[1333]: E1213 15:20:20.406268 1333 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:20:20.408920 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:20:20.409181 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:20:20.429891 sudo[1339]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:20:20.430938 sudo[1339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:20:20.443108 dbus-daemon[1169]: Ѝ\u0014\u0011\x8bU: received setenforce notice (enforcing=-1753048400) Dec 13 15:20:20.444024 sudo[1339]: pam_unix(sudo:session): session closed for user root Dec 13 15:20:20.588995 sshd[1326]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:20.594621 systemd[1]: sshd@6-10.244.14.190:22-139.178.68.195:43000.service: Deactivated successfully. Dec 13 15:20:20.595790 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:20:20.596583 systemd-logind[1180]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:20:20.597873 systemd-logind[1180]: Removed session 7. Dec 13 15:20:20.737230 systemd[1]: Started sshd@7-10.244.14.190:22-139.178.68.195:43002.service. Dec 13 15:20:21.630632 sshd[1343]: Accepted publickey for core from 139.178.68.195 port 43002 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:21.633389 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:21.640303 systemd-logind[1180]: New session 8 of user core. Dec 13 15:20:21.640807 systemd[1]: Started session-8.scope. Dec 13 15:20:22.108931 sudo[1347]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:20:22.109878 sudo[1347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:20:22.114742 sudo[1347]: pam_unix(sudo:session): session closed for user root Dec 13 15:20:22.121835 sudo[1346]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:20:22.122198 sudo[1346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:20:22.136330 systemd[1]: Stopping audit-rules.service... Dec 13 15:20:22.138731 kernel: kauditd_printk_skb: 173 callbacks suppressed Dec 13 15:20:22.138854 kernel: audit: type=1305 audit(1734103222.135:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:20:22.135000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:20:22.142149 auditctl[1350]: No rules Dec 13 15:20:22.142519 kernel: audit: type=1300 audit(1734103222.135:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6b75ebd0 a2=420 a3=0 items=0 ppid=1 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:22.135000 audit[1350]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6b75ebd0 a2=420 a3=0 items=0 ppid=1 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:22.143128 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:20:22.143396 systemd[1]: Stopped audit-rules.service. Dec 13 15:20:22.150033 systemd[1]: Starting audit-rules.service... Dec 13 15:20:22.135000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:20:22.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.159912 kernel: audit: type=1327 audit(1734103222.135:213): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:20:22.160000 kernel: audit: type=1131 audit(1734103222.141:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.177925 augenrules[1367]: No rules Dec 13 15:20:22.179045 systemd[1]: Finished audit-rules.service. Dec 13 15:20:22.180410 sudo[1346]: pam_unix(sudo:session): session closed for user root Dec 13 15:20:22.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.187386 kernel: audit: type=1130 audit(1734103222.178:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.187498 kernel: audit: type=1106 audit(1734103222.179:216): pid=1346 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.179000 audit[1346]: USER_END pid=1346 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.179000 audit[1346]: CRED_DISP pid=1346 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.198263 kernel: audit: type=1104 audit(1734103222.179:217): pid=1346 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.324484 sshd[1343]: pam_unix(sshd:session): session closed for user core Dec 13 15:20:22.325000 audit[1343]: USER_END pid=1343 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:22.334328 kernel: audit: type=1106 audit(1734103222.325:218): pid=1343 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:22.334443 systemd[1]: sshd@7-10.244.14.190:22-139.178.68.195:43002.service: Deactivated successfully. Dec 13 15:20:22.325000 audit[1343]: CRED_DISP pid=1343 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:22.335443 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:20:22.341306 kernel: audit: type=1104 audit(1734103222.325:219): pid=1343 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:22.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.14.190:22-139.178.68.195:43002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.341466 systemd-logind[1180]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:20:22.348342 kernel: audit: type=1131 audit(1734103222.333:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.14.190:22-139.178.68.195:43002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:22.348040 systemd-logind[1180]: Removed session 8. Dec 13 15:20:22.471134 systemd[1]: Started sshd@8-10.244.14.190:22-139.178.68.195:43004.service. Dec 13 15:20:22.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.14.190:22-139.178.68.195:43004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:23.358000 audit[1373]: USER_ACCT pid=1373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:23.359784 sshd[1373]: Accepted publickey for core from 139.178.68.195 port 43004 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:20:23.359000 audit[1373]: CRED_ACQ pid=1373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:23.359000 audit[1373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb7445400 a2=3 a3=0 items=0 ppid=1 pid=1373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:23.359000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:20:23.361602 sshd[1373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:20:23.367699 systemd-logind[1180]: New session 9 of user core. Dec 13 15:20:23.368574 systemd[1]: Started session-9.scope. Dec 13 15:20:23.375000 audit[1373]: USER_START pid=1373 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:23.377000 audit[1375]: CRED_ACQ pid=1375 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:20:23.834000 audit[1376]: USER_ACCT pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:23.835908 sudo[1376]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:20:23.835000 audit[1376]: CRED_REFR pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:23.836913 sudo[1376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:20:23.838000 audit[1376]: USER_START pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:20:23.878011 systemd[1]: Starting docker.service... Dec 13 15:20:23.937029 env[1386]: time="2024-12-13T15:20:23.936908109Z" level=info msg="Starting up" Dec 13 15:20:23.939570 env[1386]: time="2024-12-13T15:20:23.939431741Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:20:23.939570 env[1386]: time="2024-12-13T15:20:23.939458841Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:20:23.939570 env[1386]: time="2024-12-13T15:20:23.939484665Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:20:23.939570 env[1386]: time="2024-12-13T15:20:23.939517621Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:20:23.944355 env[1386]: time="2024-12-13T15:20:23.944324259Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:20:23.944487 env[1386]: time="2024-12-13T15:20:23.944458890Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:20:23.944600 env[1386]: time="2024-12-13T15:20:23.944570760Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:20:23.944728 env[1386]: time="2024-12-13T15:20:23.944700592Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:20:23.954818 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3925880841-merged.mount: Deactivated successfully. Dec 13 15:20:24.000154 env[1386]: time="2024-12-13T15:20:24.000081471Z" level=info msg="Loading containers: start." Dec 13 15:20:24.088000 audit[1419]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.088000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff7adc10a0 a2=0 a3=7fff7adc108c items=0 ppid=1386 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 15:20:24.091000 audit[1421]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.091000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcda29ace0 a2=0 a3=7ffcda29accc items=0 ppid=1386 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 15:20:24.094000 audit[1423]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.094000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff3c0e7300 a2=0 a3=7fff3c0e72ec items=0 ppid=1386 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:20:24.097000 audit[1425]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.097000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffebc95f5f0 a2=0 a3=7ffebc95f5dc items=0 ppid=1386 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.097000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:20:24.101000 audit[1427]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.101000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe25efcb30 a2=0 a3=7ffe25efcb1c items=0 ppid=1386 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 15:20:24.126000 audit[1432]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.126000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0265f450 a2=0 a3=7ffd0265f43c items=0 ppid=1386 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 15:20:24.135000 audit[1434]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.135000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff7242e00 a2=0 a3=7ffff7242dec items=0 ppid=1386 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.135000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 15:20:24.138000 audit[1436]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.138000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd3b150350 a2=0 a3=7ffd3b15033c items=0 ppid=1386 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 15:20:24.141000 audit[1438]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.141000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffff5e74100 a2=0 a3=7ffff5e740ec items=0 ppid=1386 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:20:24.154000 audit[1442]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.154000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc9a17e150 a2=0 a3=7ffc9a17e13c items=0 ppid=1386 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:20:24.158000 audit[1443]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.158000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec1322400 a2=0 a3=7ffec13223ec items=0 ppid=1386 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:20:24.172244 kernel: Initializing XFRM netlink socket Dec 13 15:20:24.227779 env[1386]: time="2024-12-13T15:20:24.227728878Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 15:20:24.272000 audit[1451]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.272000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff3c078720 a2=0 a3=7fff3c07870c items=0 ppid=1386 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 15:20:24.286000 audit[1454]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.286000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffad0be860 a2=0 a3=7fffad0be84c items=0 ppid=1386 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 15:20:24.292000 audit[1457]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.292000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe1e0a11c0 a2=0 a3=7ffe1e0a11ac items=0 ppid=1386 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 15:20:24.295000 audit[1459]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.295000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd976fffb0 a2=0 a3=7ffd976fff9c items=0 ppid=1386 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 15:20:24.298000 audit[1461]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.298000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffccc067340 a2=0 a3=7ffccc06732c items=0 ppid=1386 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 15:20:24.301000 audit[1463]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.301000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcaee33290 a2=0 a3=7ffcaee3327c items=0 ppid=1386 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 15:20:24.304000 audit[1465]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.304000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffec3ebdbe0 a2=0 a3=7ffec3ebdbcc items=0 ppid=1386 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 15:20:24.316000 audit[1468]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.316000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe42b62f70 a2=0 a3=7ffe42b62f5c items=0 ppid=1386 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 15:20:24.321000 audit[1470]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.321000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd7e674680 a2=0 a3=7ffd7e67466c items=0 ppid=1386 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:20:24.324000 audit[1472]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.324000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe3a7b4560 a2=0 a3=7ffe3a7b454c items=0 ppid=1386 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:20:24.327000 audit[1474]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.327000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeeabeb260 a2=0 a3=7ffeeabeb24c items=0 ppid=1386 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 15:20:24.329871 systemd-networkd[1025]: docker0: Link UP Dec 13 15:20:24.340000 audit[1478]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.340000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeda77c4e0 a2=0 a3=7ffeda77c4cc items=0 ppid=1386 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:20:24.346000 audit[1479]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:24.346000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe8fe130f0 a2=0 a3=7ffe8fe130dc items=0 ppid=1386 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:24.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:20:24.348513 env[1386]: time="2024-12-13T15:20:24.348474581Z" level=info msg="Loading containers: done." Dec 13 15:20:24.373531 env[1386]: time="2024-12-13T15:20:24.373417494Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 15:20:24.373782 env[1386]: time="2024-12-13T15:20:24.373750572Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 15:20:24.373973 env[1386]: time="2024-12-13T15:20:24.373936817Z" level=info msg="Daemon has completed initialization" Dec 13 15:20:24.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:24.412379 systemd[1]: Started docker.service. Dec 13 15:20:24.418048 env[1386]: time="2024-12-13T15:20:24.417983256Z" level=info msg="API listen on /run/docker.sock" Dec 13 15:20:25.963471 env[1191]: time="2024-12-13T15:20:25.963335252Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 15:20:26.795353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3481405604.mount: Deactivated successfully. Dec 13 15:20:29.172078 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 15:20:29.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:29.175343 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 15:20:29.175460 kernel: audit: type=1131 audit(1734103229.171:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:29.197000 audit: BPF prog-id=46 op=UNLOAD Dec 13 15:20:29.200405 kernel: audit: type=1334 audit(1734103229.197:256): prog-id=46 op=UNLOAD Dec 13 15:20:29.197000 audit: BPF prog-id=45 op=UNLOAD Dec 13 15:20:29.204142 kernel: audit: type=1334 audit(1734103229.197:257): prog-id=45 op=UNLOAD Dec 13 15:20:29.204255 kernel: audit: type=1334 audit(1734103229.197:258): prog-id=44 op=UNLOAD Dec 13 15:20:29.197000 audit: BPF prog-id=44 op=UNLOAD Dec 13 15:20:29.499904 env[1191]: time="2024-12-13T15:20:29.499823843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:29.502027 env[1191]: time="2024-12-13T15:20:29.501991388Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:29.506334 env[1191]: time="2024-12-13T15:20:29.506250871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:29.507925 env[1191]: time="2024-12-13T15:20:29.507885111Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:29.509441 env[1191]: time="2024-12-13T15:20:29.509373627Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 15:20:29.524708 env[1191]: time="2024-12-13T15:20:29.524602814Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 15:20:30.463589 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:20:30.464023 systemd[1]: Stopped kubelet.service. Dec 13 15:20:30.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:30.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:30.471818 systemd[1]: Starting kubelet.service... Dec 13 15:20:30.476444 kernel: audit: type=1130 audit(1734103230.462:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:30.476549 kernel: audit: type=1131 audit(1734103230.462:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:30.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:30.811325 kernel: audit: type=1130 audit(1734103230.801:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:30.802264 systemd[1]: Started kubelet.service. Dec 13 15:20:30.897793 kubelet[1532]: E1213 15:20:30.897690 1532 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:20:30.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:20:30.907422 kernel: audit: type=1131 audit(1734103230.899:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:20:30.900250 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:20:30.900535 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:20:32.519994 env[1191]: time="2024-12-13T15:20:32.519867105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:32.522311 env[1191]: time="2024-12-13T15:20:32.522274217Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:32.525455 env[1191]: time="2024-12-13T15:20:32.525413580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:32.528470 env[1191]: time="2024-12-13T15:20:32.528434427Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:32.529668 env[1191]: time="2024-12-13T15:20:32.529601560Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 15:20:32.545398 env[1191]: time="2024-12-13T15:20:32.545248400Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 15:20:34.466925 env[1191]: time="2024-12-13T15:20:34.466861729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:34.472086 env[1191]: time="2024-12-13T15:20:34.472012882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:34.475068 env[1191]: time="2024-12-13T15:20:34.474993094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:34.478278 env[1191]: time="2024-12-13T15:20:34.478228493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:34.480898 env[1191]: time="2024-12-13T15:20:34.479638633Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 15:20:34.498367 env[1191]: time="2024-12-13T15:20:34.498302880Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 15:20:36.159130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount435658837.mount: Deactivated successfully. Dec 13 15:20:37.147132 env[1191]: time="2024-12-13T15:20:37.146998338Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:37.150498 env[1191]: time="2024-12-13T15:20:37.150430170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:37.153295 env[1191]: time="2024-12-13T15:20:37.152349073Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:37.156074 env[1191]: time="2024-12-13T15:20:37.156030432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:37.157405 env[1191]: time="2024-12-13T15:20:37.157244608Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 15:20:37.182460 env[1191]: time="2024-12-13T15:20:37.182389096Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 15:20:37.854869 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1450310519.mount: Deactivated successfully. Dec 13 15:20:40.091684 env[1191]: time="2024-12-13T15:20:40.091536363Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.096176 env[1191]: time="2024-12-13T15:20:40.096123085Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.107624 env[1191]: time="2024-12-13T15:20:40.105489471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.113389 env[1191]: time="2024-12-13T15:20:40.113321175Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.113970 env[1191]: time="2024-12-13T15:20:40.113889830Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 15:20:40.130743 env[1191]: time="2024-12-13T15:20:40.130678011Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 15:20:40.808564 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2257406222.mount: Deactivated successfully. Dec 13 15:20:40.816088 env[1191]: time="2024-12-13T15:20:40.816031046Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.819602 env[1191]: time="2024-12-13T15:20:40.819556717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.821772 env[1191]: time="2024-12-13T15:20:40.821734386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.823999 env[1191]: time="2024-12-13T15:20:40.823959859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:40.825309 env[1191]: time="2024-12-13T15:20:40.825266236Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 15:20:40.840392 env[1191]: time="2024-12-13T15:20:40.840326874Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 15:20:40.967810 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 15:20:40.968305 systemd[1]: Stopped kubelet.service. Dec 13 15:20:40.980139 kernel: audit: type=1130 audit(1734103240.967:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:40.980319 kernel: audit: type=1131 audit(1734103240.967:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:40.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:40.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:40.975336 systemd[1]: Starting kubelet.service... Dec 13 15:20:41.150456 systemd[1]: Started kubelet.service. Dec 13 15:20:41.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:41.156281 kernel: audit: type=1130 audit(1734103241.149:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:41.237718 kubelet[1569]: E1213 15:20:41.237604 1569 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:20:41.240350 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:20:41.240628 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:20:41.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:20:41.247261 kernel: audit: type=1131 audit(1734103241.239:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:20:41.505184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount458105524.mount: Deactivated successfully. Dec 13 15:20:42.433164 update_engine[1181]: I1213 15:20:42.431603 1181 update_attempter.cc:509] Updating boot flags... Dec 13 15:20:45.878552 env[1191]: time="2024-12-13T15:20:45.878347023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:45.881473 env[1191]: time="2024-12-13T15:20:45.881416551Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:45.884064 env[1191]: time="2024-12-13T15:20:45.884018032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:45.887067 env[1191]: time="2024-12-13T15:20:45.887020996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:45.888519 env[1191]: time="2024-12-13T15:20:45.888387594Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 15:20:49.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:49.484999 systemd[1]: Stopped kubelet.service. Dec 13 15:20:49.496007 kernel: audit: type=1130 audit(1734103249.484:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:49.496176 kernel: audit: type=1131 audit(1734103249.487:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:49.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:49.498069 systemd[1]: Starting kubelet.service... Dec 13 15:20:49.528486 systemd[1]: Reloading. Dec 13 15:20:49.687114 /usr/lib/systemd/system-generators/torcx-generator[1681]: time="2024-12-13T15:20:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:20:49.688788 /usr/lib/systemd/system-generators/torcx-generator[1681]: time="2024-12-13T15:20:49Z" level=info msg="torcx already run" Dec 13 15:20:49.813694 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:20:49.813738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:20:49.844322 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:20:49.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957870 kernel: audit: type=1400 audit(1734103249.941:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957982 kernel: audit: type=1400 audit(1734103249.941:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.958050 kernel: audit: type=1400 audit(1734103249.951:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.964972 kernel: audit: type=1400 audit(1734103249.951:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.972806 kernel: audit: type=1400 audit(1734103249.951:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.978888 kernel: audit: type=1400 audit(1734103249.951:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.978975 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:20:49.984305 kernel: audit: type=1400 audit(1734103249.951:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.956000 audit: BPF prog-id=49 op=LOAD Dec 13 15:20:49.956000 audit: BPF prog-id=40 op=UNLOAD Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit: BPF prog-id=50 op=LOAD Dec 13 15:20:49.963000 audit: BPF prog-id=30 op=UNLOAD Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit: BPF prog-id=51 op=LOAD Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.963000 audit: BPF prog-id=52 op=LOAD Dec 13 15:20:49.963000 audit: BPF prog-id=31 op=UNLOAD Dec 13 15:20:49.963000 audit: BPF prog-id=32 op=UNLOAD Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit: BPF prog-id=53 op=LOAD Dec 13 15:20:49.965000 audit: BPF prog-id=39 op=UNLOAD Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.970000 audit: BPF prog-id=54 op=LOAD Dec 13 15:20:49.970000 audit: BPF prog-id=33 op=UNLOAD Dec 13 15:20:49.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.984000 audit: BPF prog-id=58 op=LOAD Dec 13 15:20:49.984000 audit: BPF prog-id=47 op=UNLOAD Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit: BPF prog-id=61 op=LOAD Dec 13 15:20:49.988000 audit: BPF prog-id=36 op=UNLOAD Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit: BPF prog-id=62 op=LOAD Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:49.988000 audit: BPF prog-id=63 op=LOAD Dec 13 15:20:49.988000 audit: BPF prog-id=37 op=UNLOAD Dec 13 15:20:49.988000 audit: BPF prog-id=38 op=UNLOAD Dec 13 15:20:50.031965 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 15:20:50.032104 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 15:20:50.032506 systemd[1]: Stopped kubelet.service. Dec 13 15:20:50.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:20:50.038171 systemd[1]: Starting kubelet.service... Dec 13 15:20:50.252981 systemd[1]: Started kubelet.service. Dec 13 15:20:50.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:50.519899 kubelet[1731]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:20:50.520613 kubelet[1731]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:20:50.520725 kubelet[1731]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:20:50.520990 kubelet[1731]: I1213 15:20:50.520915 1731 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:20:51.258364 kubelet[1731]: I1213 15:20:51.258298 1731 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 15:20:51.258364 kubelet[1731]: I1213 15:20:51.258347 1731 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:20:51.258727 kubelet[1731]: I1213 15:20:51.258695 1731 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 15:20:51.278068 kubelet[1731]: E1213 15:20:51.278031 1731 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.244.14.190:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.278337 kubelet[1731]: I1213 15:20:51.278293 1731 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:20:51.294378 kubelet[1731]: I1213 15:20:51.294352 1731 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:20:51.294999 kubelet[1731]: I1213 15:20:51.294946 1731 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:20:51.295454 kubelet[1731]: I1213 15:20:51.295118 1731 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-fauys.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:20:51.296553 kubelet[1731]: I1213 15:20:51.296526 1731 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:20:51.296692 kubelet[1731]: I1213 15:20:51.296670 1731 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:20:51.297019 kubelet[1731]: I1213 15:20:51.296995 1731 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:20:51.298665 kubelet[1731]: I1213 15:20:51.298641 1731 kubelet.go:400] "Attempting to sync node with API server" Dec 13 15:20:51.298810 kubelet[1731]: I1213 15:20:51.298784 1731 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:20:51.299654 kubelet[1731]: I1213 15:20:51.299630 1731 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:20:51.299826 kubelet[1731]: I1213 15:20:51.299801 1731 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:20:51.304808 kubelet[1731]: W1213 15:20:51.304592 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.14.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-fauys.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.304808 kubelet[1731]: E1213 15:20:51.304711 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.244.14.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-fauys.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.309584 kubelet[1731]: I1213 15:20:51.309553 1731 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:20:51.311419 kubelet[1731]: I1213 15:20:51.311383 1731 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:20:51.311666 kubelet[1731]: W1213 15:20:51.311641 1731 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:20:51.315385 kubelet[1731]: I1213 15:20:51.315332 1731 server.go:1264] "Started kubelet" Dec 13 15:20:51.316048 kubelet[1731]: W1213 15:20:51.315527 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.14.190:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.316048 kubelet[1731]: E1213 15:20:51.315598 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.244.14.190:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.324000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:51.324000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:20:51.324000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b04fc0 a1=c000b267e0 a2=c000b04f90 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:20:51.324000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:51.324000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:20:51.324000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00071a6a0 a1=c000b267f8 a2=c000b05050 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:20:51.326734 kubelet[1731]: I1213 15:20:51.325879 1731 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:20:51.326734 kubelet[1731]: I1213 15:20:51.325984 1731 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:20:51.326734 kubelet[1731]: I1213 15:20:51.326113 1731 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:20:51.327345 kubelet[1731]: E1213 15:20:51.327174 1731 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.14.190:6443/api/v1/namespaces/default/events\": dial tcp 10.244.14.190:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-fauys.gb1.brightbox.com.1810c5b82a7f4556 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-fauys.gb1.brightbox.com,UID:srv-fauys.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-fauys.gb1.brightbox.com,},FirstTimestamp:2024-12-13 15:20:51.31527919 +0000 UTC m=+1.053913612,LastTimestamp:2024-12-13 15:20:51.31527919 +0000 UTC m=+1.053913612,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-fauys.gb1.brightbox.com,}" Dec 13 15:20:51.329000 audit[1742]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.329000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff875d1070 a2=0 a3=7fff875d105c items=0 ppid=1731 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:20:51.332464 kubelet[1731]: I1213 15:20:51.332395 1731 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:20:51.331000 audit[1743]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.331000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8fb68390 a2=0 a3=7fff8fb6837c items=0 ppid=1731 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:20:51.334122 kubelet[1731]: I1213 15:20:51.334098 1731 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:20:51.334439 kubelet[1731]: I1213 15:20:51.334354 1731 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:20:51.334992 kubelet[1731]: I1213 15:20:51.334963 1731 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:20:51.335109 kubelet[1731]: I1213 15:20:51.334974 1731 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 15:20:51.335334 kubelet[1731]: I1213 15:20:51.335311 1731 reconciler.go:26] "Reconciler: start to sync state" Dec 13 15:20:51.336244 kubelet[1731]: E1213 15:20:51.336001 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.14.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-fauys.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.14.190:6443: connect: connection refused" interval="200ms" Dec 13 15:20:51.336244 kubelet[1731]: I1213 15:20:51.336239 1731 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:20:51.336399 kubelet[1731]: I1213 15:20:51.336354 1731 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:20:51.337852 kubelet[1731]: E1213 15:20:51.337777 1731 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:20:51.338153 kubelet[1731]: I1213 15:20:51.338038 1731 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:20:51.339737 kubelet[1731]: I1213 15:20:51.339711 1731 server.go:455] "Adding debug handlers to kubelet server" Dec 13 15:20:51.346000 audit[1746]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.346000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4fb28440 a2=0 a3=7ffd4fb2842c items=0 ppid=1731 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:20:51.351083 kubelet[1731]: W1213 15:20:51.351030 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.14.190:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.351292 kubelet[1731]: E1213 15:20:51.351268 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.244.14.190:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.350000 audit[1748]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.350000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd02f3b0d0 a2=0 a3=7ffd02f3b0bc items=0 ppid=1731 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:20:51.405000 audit[1755]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.405000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd68540080 a2=0 a3=7ffd6854006c items=0 ppid=1731 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:20:51.408766 kubelet[1731]: I1213 15:20:51.408700 1731 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:20:51.410000 audit[1756]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:20:51.410000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffdd76dea0 a2=0 a3=7fffdd76de8c items=0 ppid=1731 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:20:51.413086 kubelet[1731]: I1213 15:20:51.413060 1731 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:20:51.413249 kubelet[1731]: I1213 15:20:51.413200 1731 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:20:51.413350 kubelet[1731]: I1213 15:20:51.413281 1731 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:20:51.413350 kubelet[1731]: I1213 15:20:51.413316 1731 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 15:20:51.413474 kubelet[1731]: E1213 15:20:51.413402 1731 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:20:51.413609 kubelet[1731]: I1213 15:20:51.413582 1731 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:20:51.413775 kubelet[1731]: I1213 15:20:51.413753 1731 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:20:51.414625 kubelet[1731]: W1213 15:20:51.414570 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.14.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.414797 kubelet[1731]: E1213 15:20:51.414771 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.244.14.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:51.413000 audit[1759]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:20:51.413000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0817cbc0 a2=0 a3=7ffe0817cbac items=0 ppid=1731 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:20:51.417405 kubelet[1731]: I1213 15:20:51.417366 1731 policy_none.go:49] "None policy: Start" Dec 13 15:20:51.416000 audit[1757]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.416000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd0ba2cf0 a2=0 a3=7ffcd0ba2cdc items=0 ppid=1731 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:20:51.418190 kubelet[1731]: I1213 15:20:51.418111 1731 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:20:51.418190 kubelet[1731]: I1213 15:20:51.418147 1731 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:20:51.418000 audit[1760]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:20:51.418000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd01ce0170 a2=0 a3=7ffd01ce015c items=0 ppid=1731 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:20:51.422000 audit[1762]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:20:51.422000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffa687e1e0 a2=0 a3=7fffa687e1cc items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:20:51.427657 systemd[1]: Created slice kubepods.slice. Dec 13 15:20:51.425000 audit[1761]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.425000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbd977780 a2=0 a3=7ffdbd97776c items=0 ppid=1731 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:20:51.429000 audit[1763]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:20:51.429000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdef3588d0 a2=0 a3=7ffdef3588bc items=0 ppid=1731 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:20:51.434334 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 15:20:51.439105 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 15:20:51.441248 kubelet[1731]: I1213 15:20:51.441180 1731 kubelet_node_status.go:73] "Attempting to register node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.441885 kubelet[1731]: E1213 15:20:51.441841 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.14.190:6443/api/v1/nodes\": dial tcp 10.244.14.190:6443: connect: connection refused" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.444369 kubelet[1731]: I1213 15:20:51.444342 1731 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:20:51.443000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:51.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:20:51.443000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d27bf0 a1=c000e1ef00 a2=c000d27bc0 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:51.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:20:51.445211 kubelet[1731]: I1213 15:20:51.445181 1731 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:20:51.446141 kubelet[1731]: I1213 15:20:51.446068 1731 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 15:20:51.446493 kubelet[1731]: I1213 15:20:51.446470 1731 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:20:51.449999 kubelet[1731]: E1213 15:20:51.449966 1731 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-fauys.gb1.brightbox.com\" not found" Dec 13 15:20:51.514897 kubelet[1731]: I1213 15:20:51.513866 1731 topology_manager.go:215] "Topology Admit Handler" podUID="2ab669e6d49ba14a935b8a04802d3fa6" podNamespace="kube-system" podName="kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.517736 kubelet[1731]: I1213 15:20:51.517699 1731 topology_manager.go:215] "Topology Admit Handler" podUID="d4a15e88e10a0d9ef3ea4c8112733c36" podNamespace="kube-system" podName="kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.520581 kubelet[1731]: I1213 15:20:51.520554 1731 topology_manager.go:215] "Topology Admit Handler" podUID="ecccc56f009cfcf7d78a4e6c39b1397a" podNamespace="kube-system" podName="kube-scheduler-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.529343 systemd[1]: Created slice kubepods-burstable-pod2ab669e6d49ba14a935b8a04802d3fa6.slice. Dec 13 15:20:51.536159 kubelet[1731]: I1213 15:20:51.536106 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ecccc56f009cfcf7d78a4e6c39b1397a-kubeconfig\") pod \"kube-scheduler-srv-fauys.gb1.brightbox.com\" (UID: \"ecccc56f009cfcf7d78a4e6c39b1397a\") " pod="kube-system/kube-scheduler-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.536469 kubelet[1731]: I1213 15:20:51.536407 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2ab669e6d49ba14a935b8a04802d3fa6-usr-share-ca-certificates\") pod \"kube-apiserver-srv-fauys.gb1.brightbox.com\" (UID: \"2ab669e6d49ba14a935b8a04802d3fa6\") " pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.536634 kubelet[1731]: E1213 15:20:51.536549 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.14.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-fauys.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.14.190:6443: connect: connection refused" interval="400ms" Dec 13 15:20:51.536785 kubelet[1731]: I1213 15:20:51.536618 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-kubeconfig\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.537017 kubelet[1731]: I1213 15:20:51.536980 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.537285 kubelet[1731]: I1213 15:20:51.537208 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-flexvolume-dir\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.537486 kubelet[1731]: I1213 15:20:51.537449 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-k8s-certs\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.537691 kubelet[1731]: I1213 15:20:51.537642 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2ab669e6d49ba14a935b8a04802d3fa6-ca-certs\") pod \"kube-apiserver-srv-fauys.gb1.brightbox.com\" (UID: \"2ab669e6d49ba14a935b8a04802d3fa6\") " pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.537944 kubelet[1731]: I1213 15:20:51.537883 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2ab669e6d49ba14a935b8a04802d3fa6-k8s-certs\") pod \"kube-apiserver-srv-fauys.gb1.brightbox.com\" (UID: \"2ab669e6d49ba14a935b8a04802d3fa6\") " pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.538161 kubelet[1731]: I1213 15:20:51.538125 1731 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-ca-certs\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.544132 systemd[1]: Created slice kubepods-burstable-podd4a15e88e10a0d9ef3ea4c8112733c36.slice. Dec 13 15:20:51.554557 systemd[1]: Created slice kubepods-burstable-podecccc56f009cfcf7d78a4e6c39b1397a.slice. Dec 13 15:20:51.646247 kubelet[1731]: I1213 15:20:51.646167 1731 kubelet_node_status.go:73] "Attempting to register node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.646786 kubelet[1731]: E1213 15:20:51.646698 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.14.190:6443/api/v1/nodes\": dial tcp 10.244.14.190:6443: connect: connection refused" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:51.843647 env[1191]: time="2024-12-13T15:20:51.842925435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-fauys.gb1.brightbox.com,Uid:2ab669e6d49ba14a935b8a04802d3fa6,Namespace:kube-system,Attempt:0,}" Dec 13 15:20:51.851196 env[1191]: time="2024-12-13T15:20:51.851114996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-fauys.gb1.brightbox.com,Uid:d4a15e88e10a0d9ef3ea4c8112733c36,Namespace:kube-system,Attempt:0,}" Dec 13 15:20:51.859988 env[1191]: time="2024-12-13T15:20:51.859929466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-fauys.gb1.brightbox.com,Uid:ecccc56f009cfcf7d78a4e6c39b1397a,Namespace:kube-system,Attempt:0,}" Dec 13 15:20:51.937642 kubelet[1731]: E1213 15:20:51.937521 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.14.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-fauys.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.14.190:6443: connect: connection refused" interval="800ms" Dec 13 15:20:52.050292 kubelet[1731]: I1213 15:20:52.050246 1731 kubelet_node_status.go:73] "Attempting to register node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:52.050813 kubelet[1731]: E1213 15:20:52.050757 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.14.190:6443/api/v1/nodes\": dial tcp 10.244.14.190:6443: connect: connection refused" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:52.471960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1473109269.mount: Deactivated successfully. Dec 13 15:20:52.476999 env[1191]: time="2024-12-13T15:20:52.476917895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.478390 env[1191]: time="2024-12-13T15:20:52.478341423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.481878 env[1191]: time="2024-12-13T15:20:52.481841568Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.484517 env[1191]: time="2024-12-13T15:20:52.484460056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.485465 env[1191]: time="2024-12-13T15:20:52.485426583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.486573 env[1191]: time="2024-12-13T15:20:52.486537567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.488501 env[1191]: time="2024-12-13T15:20:52.488466685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.490685 env[1191]: time="2024-12-13T15:20:52.490648949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.492302 env[1191]: time="2024-12-13T15:20:52.492266829Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.495358 env[1191]: time="2024-12-13T15:20:52.495323394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.496821 env[1191]: time="2024-12-13T15:20:52.496779377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.511183 env[1191]: time="2024-12-13T15:20:52.511137337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:20:52.545162 env[1191]: time="2024-12-13T15:20:52.544991010Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:20:52.545162 env[1191]: time="2024-12-13T15:20:52.545112550Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:20:52.545570 env[1191]: time="2024-12-13T15:20:52.545130971Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:20:52.545956 env[1191]: time="2024-12-13T15:20:52.545899728Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41f8b0093d135af7f182df6288b1e10cd297d379c7c3a7f264bcf06008a59284 pid=1771 runtime=io.containerd.runc.v2 Dec 13 15:20:52.561751 env[1191]: time="2024-12-13T15:20:52.561597273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:20:52.561751 env[1191]: time="2024-12-13T15:20:52.561696722Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:20:52.562717 env[1191]: time="2024-12-13T15:20:52.561715223Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:20:52.563606 env[1191]: time="2024-12-13T15:20:52.563541431Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55f66671d880f59e83ce7dd7a91602984849f1c6a34400028b6e32e622e97cc1 pid=1795 runtime=io.containerd.runc.v2 Dec 13 15:20:52.567319 env[1191]: time="2024-12-13T15:20:52.567193575Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:20:52.567441 env[1191]: time="2024-12-13T15:20:52.567346136Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:20:52.567508 env[1191]: time="2024-12-13T15:20:52.567435087Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:20:52.567739 env[1191]: time="2024-12-13T15:20:52.567684395Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3328ce2a59afd34a61d399d5dc58455afd8de5625bb55213a04a096f8bc96750 pid=1797 runtime=io.containerd.runc.v2 Dec 13 15:20:52.584737 systemd[1]: Started cri-containerd-41f8b0093d135af7f182df6288b1e10cd297d379c7c3a7f264bcf06008a59284.scope. Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.618000 audit: BPF prog-id=64 op=LOAD Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1771 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431663862303039336431333561663766313832646636323838623165 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1771 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431663862303039336431333561663766313832646636323838623165 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.621000 audit: BPF prog-id=65 op=LOAD Dec 13 15:20:52.621000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098520 items=0 ppid=1771 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431663862303039336431333561663766313832646636323838623165 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.623000 audit: BPF prog-id=66 op=LOAD Dec 13 15:20:52.623000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098568 items=0 ppid=1771 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431663862303039336431333561663766313832646636323838623165 Dec 13 15:20:52.625000 audit: BPF prog-id=66 op=UNLOAD Dec 13 15:20:52.625000 audit: BPF prog-id=65 op=UNLOAD Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.631127 systemd[1]: Started cri-containerd-55f66671d880f59e83ce7dd7a91602984849f1c6a34400028b6e32e622e97cc1.scope. Dec 13 15:20:52.626000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.626000 audit: BPF prog-id=67 op=LOAD Dec 13 15:20:52.626000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098978 items=0 ppid=1771 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431663862303039336431333561663766313832646636323838623165 Dec 13 15:20:52.645788 systemd[1]: Started cri-containerd-3328ce2a59afd34a61d399d5dc58455afd8de5625bb55213a04a096f8bc96750.scope. Dec 13 15:20:52.667768 kubelet[1731]: W1213 15:20:52.667584 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.14.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-fauys.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.667768 kubelet[1731]: E1213 15:20:52.667692 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.244.14.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-fauys.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.687000 audit: BPF prog-id=68 op=LOAD Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.692000 audit: BPF prog-id=69 op=LOAD Dec 13 15:20:52.697000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.697000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1797 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863653261353961666433346136316433393964356463353834 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1797 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863653261353961666433346136316433393964356463353834 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.698000 audit: BPF prog-id=70 op=LOAD Dec 13 15:20:52.698000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025590 items=0 ppid=1797 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863653261353961666433346136316433393964356463353834 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.699000 audit: BPF prog-id=71 op=LOAD Dec 13 15:20:52.699000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000255d8 items=0 ppid=1797 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863653261353961666433346136316433393964356463353834 Dec 13 15:20:52.701000 audit: BPF prog-id=71 op=UNLOAD Dec 13 15:20:52.701000 audit: BPF prog-id=70 op=UNLOAD Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.701000 audit: BPF prog-id=72 op=LOAD Dec 13 15:20:52.701000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000259e8 items=0 ppid=1797 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1795 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663636363731643838306635396538336365376464376139313630 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1795 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663636363731643838306635396538336365376464376139313630 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit: BPF prog-id=73 op=LOAD Dec 13 15:20:52.702000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028a640 items=0 ppid=1795 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663636363731643838306635396538336365376464376139313630 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.702000 audit: BPF prog-id=74 op=LOAD Dec 13 15:20:52.702000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028a688 items=0 ppid=1795 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663636363731643838306635396538336365376464376139313630 Dec 13 15:20:52.703000 audit: BPF prog-id=74 op=UNLOAD Dec 13 15:20:52.703000 audit: BPF prog-id=73 op=UNLOAD Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.703000 audit: BPF prog-id=75 op=LOAD Dec 13 15:20:52.703000 audit[1823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028aa98 items=0 ppid=1795 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663636363731643838306635396538336365376464376139313630 Dec 13 15:20:52.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863653261353961666433346136316433393964356463353834 Dec 13 15:20:52.737156 env[1191]: time="2024-12-13T15:20:52.736154263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-fauys.gb1.brightbox.com,Uid:d4a15e88e10a0d9ef3ea4c8112733c36,Namespace:kube-system,Attempt:0,} returns sandbox id \"41f8b0093d135af7f182df6288b1e10cd297d379c7c3a7f264bcf06008a59284\"" Dec 13 15:20:52.743112 kubelet[1731]: W1213 15:20:52.742503 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.14.190:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.743112 kubelet[1731]: E1213 15:20:52.742795 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.244.14.190:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.743112 kubelet[1731]: E1213 15:20:52.742985 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.14.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-fauys.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.14.190:6443: connect: connection refused" interval="1.6s" Dec 13 15:20:52.748981 env[1191]: time="2024-12-13T15:20:52.748937258Z" level=info msg="CreateContainer within sandbox \"41f8b0093d135af7f182df6288b1e10cd297d379c7c3a7f264bcf06008a59284\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 15:20:52.767249 env[1191]: time="2024-12-13T15:20:52.767170280Z" level=info msg="CreateContainer within sandbox \"41f8b0093d135af7f182df6288b1e10cd297d379c7c3a7f264bcf06008a59284\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"821b00399faad91ccd2c21e71cb1f1a77ac33b26faeb93a4d6bd0eb6e734a9e3\"" Dec 13 15:20:52.770502 env[1191]: time="2024-12-13T15:20:52.770461434Z" level=info msg="StartContainer for \"821b00399faad91ccd2c21e71cb1f1a77ac33b26faeb93a4d6bd0eb6e734a9e3\"" Dec 13 15:20:52.777281 env[1191]: time="2024-12-13T15:20:52.777241489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-fauys.gb1.brightbox.com,Uid:ecccc56f009cfcf7d78a4e6c39b1397a,Namespace:kube-system,Attempt:0,} returns sandbox id \"55f66671d880f59e83ce7dd7a91602984849f1c6a34400028b6e32e622e97cc1\"" Dec 13 15:20:52.780084 env[1191]: time="2024-12-13T15:20:52.780041987Z" level=info msg="CreateContainer within sandbox \"55f66671d880f59e83ce7dd7a91602984849f1c6a34400028b6e32e622e97cc1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 15:20:52.785830 env[1191]: time="2024-12-13T15:20:52.784579216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-fauys.gb1.brightbox.com,Uid:2ab669e6d49ba14a935b8a04802d3fa6,Namespace:kube-system,Attempt:0,} returns sandbox id \"3328ce2a59afd34a61d399d5dc58455afd8de5625bb55213a04a096f8bc96750\"" Dec 13 15:20:52.790051 env[1191]: time="2024-12-13T15:20:52.790010152Z" level=info msg="CreateContainer within sandbox \"3328ce2a59afd34a61d399d5dc58455afd8de5625bb55213a04a096f8bc96750\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 15:20:52.796481 env[1191]: time="2024-12-13T15:20:52.796421662Z" level=info msg="CreateContainer within sandbox \"55f66671d880f59e83ce7dd7a91602984849f1c6a34400028b6e32e622e97cc1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"de525800289150143026d681384eeb29278fdf58ee6834a73ebd093fc32d3872\"" Dec 13 15:20:52.797279 env[1191]: time="2024-12-13T15:20:52.797245070Z" level=info msg="StartContainer for \"de525800289150143026d681384eeb29278fdf58ee6834a73ebd093fc32d3872\"" Dec 13 15:20:52.805338 env[1191]: time="2024-12-13T15:20:52.805292478Z" level=info msg="CreateContainer within sandbox \"3328ce2a59afd34a61d399d5dc58455afd8de5625bb55213a04a096f8bc96750\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6e44bc510fa4f62219da656194087eb578f8617720ee8b53e408d6a43a488cff\"" Dec 13 15:20:52.806045 env[1191]: time="2024-12-13T15:20:52.806007502Z" level=info msg="StartContainer for \"6e44bc510fa4f62219da656194087eb578f8617720ee8b53e408d6a43a488cff\"" Dec 13 15:20:52.814062 systemd[1]: Started cri-containerd-821b00399faad91ccd2c21e71cb1f1a77ac33b26faeb93a4d6bd0eb6e734a9e3.scope. Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.852000 audit: BPF prog-id=76 op=LOAD Dec 13 15:20:52.858000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.858000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1771 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316230303339396661616439316363643263323165373163623166 Dec 13 15:20:52.858000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.858000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=1771 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316230303339396661616439316363643263323165373163623166 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.863144 kubelet[1731]: I1213 15:20:52.862411 1731 kubelet_node_status.go:73] "Attempting to register node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:52.863144 kubelet[1731]: E1213 15:20:52.863080 1731 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.244.14.190:6443/api/v1/nodes\": dial tcp 10.244.14.190:6443: connect: connection refused" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:52.860000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.860000 audit: BPF prog-id=77 op=LOAD Dec 13 15:20:52.860000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c0000a1c10 items=0 ppid=1771 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316230303339396661616439316363643263323165373163623166 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.862000 audit: BPF prog-id=78 op=LOAD Dec 13 15:20:52.862000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c0000a1c58 items=0 ppid=1771 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316230303339396661616439316363643263323165373163623166 Dec 13 15:20:52.863000 audit: BPF prog-id=78 op=UNLOAD Dec 13 15:20:52.864000 audit: BPF prog-id=77 op=UNLOAD Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.872133 systemd[1]: Started cri-containerd-6e44bc510fa4f62219da656194087eb578f8617720ee8b53e408d6a43a488cff.scope. Dec 13 15:20:52.866000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.866000 audit: BPF prog-id=79 op=LOAD Dec 13 15:20:52.866000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003a4068 items=0 ppid=1771 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316230303339396661616439316363643263323165373163623166 Dec 13 15:20:52.893069 systemd[1]: Started cri-containerd-de525800289150143026d681384eeb29278fdf58ee6834a73ebd093fc32d3872.scope. Dec 13 15:20:52.898243 kubelet[1731]: W1213 15:20:52.898107 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.14.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.898613 kubelet[1731]: E1213 15:20:52.898400 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.244.14.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.898613 kubelet[1731]: W1213 15:20:52.898489 1731 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.14.190:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.898613 kubelet[1731]: E1213 15:20:52.898568 1731 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.244.14.190:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.920000 audit: BPF prog-id=80 op=LOAD Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1797 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343462633531306661346636323231396461363536313934303837 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1797 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343462633531306661346636323231396461363536313934303837 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit: BPF prog-id=81 op=LOAD Dec 13 15:20:52.922000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003504d0 items=0 ppid=1797 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343462633531306661346636323231396461363536313934303837 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit: BPF prog-id=82 op=LOAD Dec 13 15:20:52.922000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000350518 items=0 ppid=1797 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343462633531306661346636323231396461363536313934303837 Dec 13 15:20:52.922000 audit: BPF prog-id=82 op=UNLOAD Dec 13 15:20:52.922000 audit: BPF prog-id=81 op=UNLOAD Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.922000 audit: BPF prog-id=83 op=LOAD Dec 13 15:20:52.922000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000350928 items=0 ppid=1797 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665343462633531306661346636323231396461363536313934303837 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.936000 audit: BPF prog-id=84 op=LOAD Dec 13 15:20:52.939000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.939000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1795 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465353235383030323839313530313433303236643638313338346565 Dec 13 15:20:52.940000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.940000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1795 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465353235383030323839313530313433303236643638313338346565 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.944000 audit: BPF prog-id=85 op=LOAD Dec 13 15:20:52.944000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000317b80 items=0 ppid=1795 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465353235383030323839313530313433303236643638313338346565 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.945000 audit: BPF prog-id=86 op=LOAD Dec 13 15:20:52.945000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000317bc8 items=0 ppid=1795 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465353235383030323839313530313433303236643638313338346565 Dec 13 15:20:52.946000 audit: BPF prog-id=86 op=UNLOAD Dec 13 15:20:52.947000 audit: BPF prog-id=85 op=UNLOAD Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:52.947000 audit: BPF prog-id=87 op=LOAD Dec 13 15:20:52.947000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000317fd8 items=0 ppid=1795 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:20:52.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465353235383030323839313530313433303236643638313338346565 Dec 13 15:20:52.991236 env[1191]: time="2024-12-13T15:20:52.991067152Z" level=info msg="StartContainer for \"821b00399faad91ccd2c21e71cb1f1a77ac33b26faeb93a4d6bd0eb6e734a9e3\" returns successfully" Dec 13 15:20:53.020412 env[1191]: time="2024-12-13T15:20:53.020257284Z" level=info msg="StartContainer for \"6e44bc510fa4f62219da656194087eb578f8617720ee8b53e408d6a43a488cff\" returns successfully" Dec 13 15:20:53.030348 env[1191]: time="2024-12-13T15:20:53.030290943Z" level=info msg="StartContainer for \"de525800289150143026d681384eeb29278fdf58ee6834a73ebd093fc32d3872\" returns successfully" Dec 13 15:20:53.337428 kubelet[1731]: E1213 15:20:53.337205 1731 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.244.14.190:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.244.14.190:6443: connect: connection refused Dec 13 15:20:54.228000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:54.228000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000dde00 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:20:54.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:20:54.230000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:54.230000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a8c000 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:20:54.230000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:20:54.466594 kubelet[1731]: I1213 15:20:54.466540 1731 kubelet_node_status.go:73] "Attempting to register node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:56.098566 kernel: kauditd_printk_skb: 666 callbacks suppressed Dec 13 15:20:56.099066 kernel: audit: type=1400 audit(1734103256.094:516): avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.094000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.094000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003e95aa0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.115242 kernel: audit: type=1300 audit(1734103256.094:516): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003e95aa0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.104000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.129410 kernel: audit: type=1327 audit(1734103256.094:516): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.129551 kernel: audit: type=1400 audit(1734103256.104:517): avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.104000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00883b8c0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.141250 kernel: audit: type=1300 audit(1734103256.104:517): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00883b8c0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.104000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.150258 kernel: audit: type=1327 audit(1734103256.104:517): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.104000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.170261 kernel: audit: type=1400 audit(1734103256.104:518): avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.104000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003f419a0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.179258 kernel: audit: type=1300 audit(1734103256.104:518): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003f419a0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.104000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.120000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.193483 kernel: audit: type=1327 audit(1734103256.104:518): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.193606 kernel: audit: type=1400 audit(1734103256.120:519): avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.120000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c005f20820 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.120000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.120000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.120000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c004f02270 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.120000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.128000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:20:56.128000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00883bd40 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:20:56.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:20:56.297982 kubelet[1731]: E1213 15:20:56.297861 1731 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-fauys.gb1.brightbox.com\" not found" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:56.307455 kubelet[1731]: I1213 15:20:56.307391 1731 apiserver.go:52] "Watching apiserver" Dec 13 15:20:56.336344 kubelet[1731]: I1213 15:20:56.336276 1731 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 15:20:56.404084 kubelet[1731]: I1213 15:20:56.403890 1731 kubelet_node_status.go:76] "Successfully registered node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:20:58.478511 systemd[1]: Reloading. Dec 13 15:20:58.633076 /usr/lib/systemd/system-generators/torcx-generator[2019]: time="2024-12-13T15:20:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:20:58.634113 /usr/lib/systemd/system-generators/torcx-generator[2019]: time="2024-12-13T15:20:58Z" level=info msg="torcx already run" Dec 13 15:20:58.742076 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:20:58.742115 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:20:58.778053 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.909000 audit: BPF prog-id=88 op=LOAD Dec 13 15:20:58.909000 audit: BPF prog-id=84 op=UNLOAD Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.910000 audit: BPF prog-id=89 op=LOAD Dec 13 15:20:58.910000 audit: BPF prog-id=49 op=UNLOAD Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.912000 audit: BPF prog-id=90 op=LOAD Dec 13 15:20:58.912000 audit: BPF prog-id=76 op=UNLOAD Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit: BPF prog-id=91 op=LOAD Dec 13 15:20:58.915000 audit: BPF prog-id=50 op=UNLOAD Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit: BPF prog-id=92 op=LOAD Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.915000 audit: BPF prog-id=93 op=LOAD Dec 13 15:20:58.915000 audit: BPF prog-id=51 op=UNLOAD Dec 13 15:20:58.915000 audit: BPF prog-id=52 op=UNLOAD Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.916000 audit: BPF prog-id=94 op=LOAD Dec 13 15:20:58.916000 audit: BPF prog-id=68 op=UNLOAD Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.917000 audit: BPF prog-id=95 op=LOAD Dec 13 15:20:58.917000 audit: BPF prog-id=80 op=UNLOAD Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.919000 audit: BPF prog-id=96 op=LOAD Dec 13 15:20:58.919000 audit: BPF prog-id=53 op=UNLOAD Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.921000 audit: BPF prog-id=97 op=LOAD Dec 13 15:20:58.921000 audit: BPF prog-id=54 op=UNLOAD Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.923000 audit: BPF prog-id=98 op=LOAD Dec 13 15:20:58.923000 audit: BPF prog-id=64 op=UNLOAD Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit: BPF prog-id=99 op=LOAD Dec 13 15:20:58.924000 audit: BPF prog-id=55 op=UNLOAD Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.924000 audit: BPF prog-id=100 op=LOAD Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.925000 audit: BPF prog-id=101 op=LOAD Dec 13 15:20:58.925000 audit: BPF prog-id=56 op=UNLOAD Dec 13 15:20:58.925000 audit: BPF prog-id=57 op=UNLOAD Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.926000 audit: BPF prog-id=102 op=LOAD Dec 13 15:20:58.926000 audit: BPF prog-id=58 op=UNLOAD Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit: BPF prog-id=103 op=LOAD Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.928000 audit: BPF prog-id=104 op=LOAD Dec 13 15:20:58.928000 audit: BPF prog-id=59 op=UNLOAD Dec 13 15:20:58.928000 audit: BPF prog-id=60 op=UNLOAD Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit: BPF prog-id=105 op=LOAD Dec 13 15:20:58.931000 audit: BPF prog-id=61 op=UNLOAD Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit: BPF prog-id=106 op=LOAD Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.931000 audit: BPF prog-id=107 op=LOAD Dec 13 15:20:58.931000 audit: BPF prog-id=62 op=UNLOAD Dec 13 15:20:58.931000 audit: BPF prog-id=63 op=UNLOAD Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:20:58.933000 audit: BPF prog-id=108 op=LOAD Dec 13 15:20:58.933000 audit: BPF prog-id=69 op=UNLOAD Dec 13 15:20:58.977737 kubelet[1731]: I1213 15:20:58.975194 1731 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:20:58.975872 systemd[1]: Stopping kubelet.service... Dec 13 15:20:59.001357 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:20:59.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:20:59.002466 systemd[1]: Stopped kubelet.service. Dec 13 15:20:59.002615 systemd[1]: kubelet.service: Consumed 1.435s CPU time. Dec 13 15:20:59.008826 systemd[1]: Starting kubelet.service... Dec 13 15:21:00.221298 systemd[1]: Started kubelet.service. Dec 13 15:21:00.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:21:00.357798 kubelet[2067]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:21:00.358516 kubelet[2067]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:21:00.358629 kubelet[2067]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:21:00.358885 kubelet[2067]: I1213 15:21:00.358810 2067 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:21:00.367878 kubelet[2067]: I1213 15:21:00.367820 2067 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 15:21:00.367878 kubelet[2067]: I1213 15:21:00.367861 2067 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:21:00.368314 kubelet[2067]: I1213 15:21:00.368238 2067 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 15:21:00.370249 kubelet[2067]: I1213 15:21:00.370207 2067 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 15:21:00.385660 kubelet[2067]: I1213 15:21:00.385565 2067 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:21:00.413498 kubelet[2067]: I1213 15:21:00.413420 2067 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:21:00.414330 kubelet[2067]: I1213 15:21:00.414256 2067 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:21:00.414860 kubelet[2067]: I1213 15:21:00.414432 2067 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-fauys.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:21:00.415214 kubelet[2067]: I1213 15:21:00.415188 2067 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:21:00.415394 kubelet[2067]: I1213 15:21:00.415371 2067 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:21:00.415613 kubelet[2067]: I1213 15:21:00.415589 2067 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:21:00.416039 kubelet[2067]: I1213 15:21:00.416008 2067 kubelet.go:400] "Attempting to sync node with API server" Dec 13 15:21:00.417435 kubelet[2067]: I1213 15:21:00.417410 2067 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:21:00.417623 kubelet[2067]: I1213 15:21:00.417592 2067 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:21:00.425842 kubelet[2067]: I1213 15:21:00.425803 2067 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:21:00.427715 kubelet[2067]: I1213 15:21:00.427687 2067 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:21:00.428162 kubelet[2067]: I1213 15:21:00.428137 2067 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:21:00.429008 kubelet[2067]: I1213 15:21:00.428984 2067 server.go:1264] "Started kubelet" Dec 13 15:21:00.445174 kubelet[2067]: I1213 15:21:00.445117 2067 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:21:00.443000 audit[2067]: AVC avc: denied { mac_admin } for pid=2067 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:00.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:21:00.443000 audit[2067]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008437a0 a1=c000858bb8 a2=c000843770 a3=25 items=0 ppid=1 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:00.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:21:00.449591 kubelet[2067]: I1213 15:21:00.449561 2067 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:21:00.449779 kubelet[2067]: I1213 15:21:00.449755 2067 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:21:00.448000 audit[2067]: AVC avc: denied { mac_admin } for pid=2067 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:00.448000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:21:00.448000 audit[2067]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a82000 a1=c000858bd0 a2=c000843830 a3=25 items=0 ppid=1 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:00.448000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:21:00.461286 kubelet[2067]: E1213 15:21:00.461200 2067 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:21:00.464523 kubelet[2067]: I1213 15:21:00.464498 2067 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:21:00.465168 kubelet[2067]: I1213 15:21:00.465141 2067 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 15:21:00.465627 kubelet[2067]: I1213 15:21:00.465603 2067 reconciler.go:26] "Reconciler: start to sync state" Dec 13 15:21:00.468352 kubelet[2067]: I1213 15:21:00.468299 2067 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:21:00.479571 kubelet[2067]: I1213 15:21:00.479435 2067 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:21:00.482126 kubelet[2067]: I1213 15:21:00.482097 2067 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:21:00.489094 kubelet[2067]: I1213 15:21:00.489059 2067 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:21:00.489296 kubelet[2067]: I1213 15:21:00.489259 2067 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 15:21:00.489545 kubelet[2067]: E1213 15:21:00.489495 2067 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:21:00.502529 kubelet[2067]: I1213 15:21:00.502442 2067 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:21:00.503726 kubelet[2067]: I1213 15:21:00.503700 2067 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:21:00.508430 kubelet[2067]: I1213 15:21:00.507121 2067 server.go:455] "Adding debug handlers to kubelet server" Dec 13 15:21:00.516252 kubelet[2067]: I1213 15:21:00.516185 2067 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:21:00.525112 kubelet[2067]: I1213 15:21:00.525071 2067 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:21:00.525496 kubelet[2067]: I1213 15:21:00.525472 2067 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:21:00.577557 kubelet[2067]: I1213 15:21:00.577506 2067 kubelet_node_status.go:73] "Attempting to register node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.589799 kubelet[2067]: E1213 15:21:00.589756 2067 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 15:21:00.592854 kubelet[2067]: I1213 15:21:00.592825 2067 kubelet_node_status.go:112] "Node was previously registered" node="srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.593096 kubelet[2067]: I1213 15:21:00.593072 2067 kubelet_node_status.go:76] "Successfully registered node" node="srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.655797 kubelet[2067]: I1213 15:21:00.655758 2067 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:21:00.656100 kubelet[2067]: I1213 15:21:00.656073 2067 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:21:00.656353 kubelet[2067]: I1213 15:21:00.656319 2067 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:21:00.656859 kubelet[2067]: I1213 15:21:00.656832 2067 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 15:21:00.657016 kubelet[2067]: I1213 15:21:00.656971 2067 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 15:21:00.657169 kubelet[2067]: I1213 15:21:00.657147 2067 policy_none.go:49] "None policy: Start" Dec 13 15:21:00.658594 kubelet[2067]: I1213 15:21:00.658570 2067 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:21:00.658786 kubelet[2067]: I1213 15:21:00.658755 2067 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:21:00.659379 kubelet[2067]: I1213 15:21:00.659357 2067 state_mem.go:75] "Updated machine memory state" Dec 13 15:21:00.690272 kubelet[2067]: I1213 15:21:00.690167 2067 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:21:00.689000 audit[2067]: AVC avc: denied { mac_admin } for pid=2067 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:00.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:21:00.689000 audit[2067]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000843710 a1=c00100f020 a2=c0008436e0 a3=25 items=0 ppid=1 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:00.690976 kubelet[2067]: I1213 15:21:00.690941 2067 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:21:00.689000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:21:00.691705 kubelet[2067]: I1213 15:21:00.691641 2067 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 15:21:00.693498 kubelet[2067]: I1213 15:21:00.693474 2067 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:21:00.792174 kubelet[2067]: I1213 15:21:00.791994 2067 topology_manager.go:215] "Topology Admit Handler" podUID="2ab669e6d49ba14a935b8a04802d3fa6" podNamespace="kube-system" podName="kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.793967 kubelet[2067]: I1213 15:21:00.793940 2067 topology_manager.go:215] "Topology Admit Handler" podUID="d4a15e88e10a0d9ef3ea4c8112733c36" podNamespace="kube-system" podName="kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.794207 kubelet[2067]: I1213 15:21:00.794178 2067 topology_manager.go:215] "Topology Admit Handler" podUID="ecccc56f009cfcf7d78a4e6c39b1397a" podNamespace="kube-system" podName="kube-scheduler-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.825629 kubelet[2067]: W1213 15:21:00.825570 2067 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:21:00.826564 kubelet[2067]: W1213 15:21:00.826522 2067 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:21:00.827452 kubelet[2067]: W1213 15:21:00.827419 2067 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:21:00.883143 kubelet[2067]: I1213 15:21:00.883063 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2ab669e6d49ba14a935b8a04802d3fa6-k8s-certs\") pod \"kube-apiserver-srv-fauys.gb1.brightbox.com\" (UID: \"2ab669e6d49ba14a935b8a04802d3fa6\") " pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.883529 kubelet[2067]: I1213 15:21:00.883488 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-ca-certs\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.883726 kubelet[2067]: I1213 15:21:00.883687 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-flexvolume-dir\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.883953 kubelet[2067]: I1213 15:21:00.883924 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-kubeconfig\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.884231 kubelet[2067]: I1213 15:21:00.884185 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2ab669e6d49ba14a935b8a04802d3fa6-ca-certs\") pod \"kube-apiserver-srv-fauys.gb1.brightbox.com\" (UID: \"2ab669e6d49ba14a935b8a04802d3fa6\") " pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.884489 kubelet[2067]: I1213 15:21:00.884443 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2ab669e6d49ba14a935b8a04802d3fa6-usr-share-ca-certificates\") pod \"kube-apiserver-srv-fauys.gb1.brightbox.com\" (UID: \"2ab669e6d49ba14a935b8a04802d3fa6\") " pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.884874 kubelet[2067]: I1213 15:21:00.884837 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-k8s-certs\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.885051 kubelet[2067]: I1213 15:21:00.885012 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a15e88e10a0d9ef3ea4c8112733c36-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-fauys.gb1.brightbox.com\" (UID: \"d4a15e88e10a0d9ef3ea4c8112733c36\") " pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" Dec 13 15:21:00.885238 kubelet[2067]: I1213 15:21:00.885193 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ecccc56f009cfcf7d78a4e6c39b1397a-kubeconfig\") pod \"kube-scheduler-srv-fauys.gb1.brightbox.com\" (UID: \"ecccc56f009cfcf7d78a4e6c39b1397a\") " pod="kube-system/kube-scheduler-srv-fauys.gb1.brightbox.com" Dec 13 15:21:01.427390 kubelet[2067]: I1213 15:21:01.427332 2067 apiserver.go:52] "Watching apiserver" Dec 13 15:21:01.465857 kubelet[2067]: I1213 15:21:01.465799 2067 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 15:21:01.582510 kubelet[2067]: W1213 15:21:01.582459 2067 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:21:01.582919 kubelet[2067]: E1213 15:21:01.582876 2067 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-fauys.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" Dec 13 15:21:01.759566 kubelet[2067]: I1213 15:21:01.759443 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-fauys.gb1.brightbox.com" podStartSLOduration=1.759402725 podStartE2EDuration="1.759402725s" podCreationTimestamp="2024-12-13 15:21:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:21:01.689938487 +0000 UTC m=+1.452694881" watchObservedRunningTime="2024-12-13 15:21:01.759402725 +0000 UTC m=+1.522159111" Dec 13 15:21:01.805855 kubelet[2067]: I1213 15:21:01.805778 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-fauys.gb1.brightbox.com" podStartSLOduration=1.805754763 podStartE2EDuration="1.805754763s" podCreationTimestamp="2024-12-13 15:21:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:21:01.800870157 +0000 UTC m=+1.563626546" watchObservedRunningTime="2024-12-13 15:21:01.805754763 +0000 UTC m=+1.568511154" Dec 13 15:21:01.806292 kubelet[2067]: I1213 15:21:01.806239 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-fauys.gb1.brightbox.com" podStartSLOduration=1.806208379 podStartE2EDuration="1.806208379s" podCreationTimestamp="2024-12-13 15:21:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:21:01.761392341 +0000 UTC m=+1.524148729" watchObservedRunningTime="2024-12-13 15:21:01.806208379 +0000 UTC m=+1.568964781" Dec 13 15:21:06.805277 sudo[1376]: pam_unix(sudo:session): session closed for user root Dec 13 15:21:06.804000 audit[1376]: USER_END pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:21:06.807057 kernel: kauditd_printk_skb: 266 callbacks suppressed Dec 13 15:21:06.807201 kernel: audit: type=1106 audit(1734103266.804:771): pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:21:06.808000 audit[1376]: CRED_DISP pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:21:06.818540 kernel: audit: type=1104 audit(1734103266.808:772): pid=1376 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:21:06.961810 sshd[1373]: pam_unix(sshd:session): session closed for user core Dec 13 15:21:06.964000 audit[1373]: USER_END pid=1373 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:21:06.970641 systemd[1]: sshd@8-10.244.14.190:22-139.178.68.195:43004.service: Deactivated successfully. Dec 13 15:21:06.972531 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:21:06.972887 systemd[1]: session-9.scope: Consumed 5.814s CPU time. Dec 13 15:21:06.976595 kernel: audit: type=1106 audit(1734103266.964:773): pid=1373 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:21:06.976702 kernel: audit: type=1104 audit(1734103266.965:774): pid=1373 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:21:06.965000 audit[1373]: CRED_DISP pid=1373 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:21:06.983134 systemd-logind[1180]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:21:06.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.14.190:22-139.178.68.195:43004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:21:06.990295 kernel: audit: type=1131 audit(1734103266.970:775): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.14.190:22-139.178.68.195:43004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:21:06.990814 systemd-logind[1180]: Removed session 9. Dec 13 15:21:09.765000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.773256 kernel: audit: type=1400 audit(1734103269.765:776): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.773371 kernel: audit: type=1400 audit(1734103269.766:777): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.766000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.766000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c8c6e0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:09.787577 kernel: audit: type=1300 audit(1734103269.766:777): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c8c6e0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:09.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:09.794836 kernel: audit: type=1327 audit(1734103269.766:777): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:09.769000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.769000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c8cf80 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:09.769000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:09.770000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.770000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d2c8e0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:09.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:09.765000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8c520 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:09.802256 kernel: audit: type=1400 audit(1734103269.769:778): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:09.765000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:09.861000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526941 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 15:21:09.861000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d225c0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:09.861000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:13.876108 kubelet[2067]: I1213 15:21:13.876013 2067 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 15:21:13.878078 env[1191]: time="2024-12-13T15:21:13.877944659Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:21:13.879134 kubelet[2067]: I1213 15:21:13.879101 2067 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 15:21:14.007114 kubelet[2067]: I1213 15:21:14.007043 2067 topology_manager.go:215] "Topology Admit Handler" podUID="ec51e1fa-0987-436c-8cc5-388f7b3a061d" podNamespace="kube-system" podName="kube-proxy-ph9k2" Dec 13 15:21:14.025138 systemd[1]: Created slice kubepods-besteffort-podec51e1fa_0987_436c_8cc5_388f7b3a061d.slice. Dec 13 15:21:14.072104 kubelet[2067]: I1213 15:21:14.072014 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ec51e1fa-0987-436c-8cc5-388f7b3a061d-kube-proxy\") pod \"kube-proxy-ph9k2\" (UID: \"ec51e1fa-0987-436c-8cc5-388f7b3a061d\") " pod="kube-system/kube-proxy-ph9k2" Dec 13 15:21:14.072104 kubelet[2067]: I1213 15:21:14.072095 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ec51e1fa-0987-436c-8cc5-388f7b3a061d-xtables-lock\") pod \"kube-proxy-ph9k2\" (UID: \"ec51e1fa-0987-436c-8cc5-388f7b3a061d\") " pod="kube-system/kube-proxy-ph9k2" Dec 13 15:21:14.072441 kubelet[2067]: I1213 15:21:14.072137 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ec51e1fa-0987-436c-8cc5-388f7b3a061d-lib-modules\") pod \"kube-proxy-ph9k2\" (UID: \"ec51e1fa-0987-436c-8cc5-388f7b3a061d\") " pod="kube-system/kube-proxy-ph9k2" Dec 13 15:21:14.072441 kubelet[2067]: I1213 15:21:14.072167 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prvss\" (UniqueName: \"kubernetes.io/projected/ec51e1fa-0987-436c-8cc5-388f7b3a061d-kube-api-access-prvss\") pod \"kube-proxy-ph9k2\" (UID: \"ec51e1fa-0987-436c-8cc5-388f7b3a061d\") " pod="kube-system/kube-proxy-ph9k2" Dec 13 15:21:14.188208 kubelet[2067]: E1213 15:21:14.187987 2067 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 15:21:14.188553 kubelet[2067]: E1213 15:21:14.188502 2067 projected.go:200] Error preparing data for projected volume kube-api-access-prvss for pod kube-system/kube-proxy-ph9k2: configmap "kube-root-ca.crt" not found Dec 13 15:21:14.189386 kubelet[2067]: E1213 15:21:14.189355 2067 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ec51e1fa-0987-436c-8cc5-388f7b3a061d-kube-api-access-prvss podName:ec51e1fa-0987-436c-8cc5-388f7b3a061d nodeName:}" failed. No retries permitted until 2024-12-13 15:21:14.689276231 +0000 UTC m=+14.452032609 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-prvss" (UniqueName: "kubernetes.io/projected/ec51e1fa-0987-436c-8cc5-388f7b3a061d-kube-api-access-prvss") pod "kube-proxy-ph9k2" (UID: "ec51e1fa-0987-436c-8cc5-388f7b3a061d") : configmap "kube-root-ca.crt" not found Dec 13 15:21:14.938311 env[1191]: time="2024-12-13T15:21:14.936553932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ph9k2,Uid:ec51e1fa-0987-436c-8cc5-388f7b3a061d,Namespace:kube-system,Attempt:0,}" Dec 13 15:21:14.972733 env[1191]: time="2024-12-13T15:21:14.972586382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:21:14.973085 env[1191]: time="2024-12-13T15:21:14.973023377Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:21:14.973410 env[1191]: time="2024-12-13T15:21:14.973353884Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:21:14.973858 env[1191]: time="2024-12-13T15:21:14.973793849Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/457ff1e6b62c912e70335619fb7a237a99235a44b20c9013466e536a92186c63 pid=2153 runtime=io.containerd.runc.v2 Dec 13 15:21:15.007429 systemd[1]: Started cri-containerd-457ff1e6b62c912e70335619fb7a237a99235a44b20c9013466e536a92186c63.scope. Dec 13 15:21:15.065498 kubelet[2067]: I1213 15:21:15.065405 2067 topology_manager.go:215] "Topology Admit Handler" podUID="19f33dbd-831a-456e-918c-a1c88f5ee80a" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-2vf78" Dec 13 15:21:15.074122 systemd[1]: Created slice kubepods-besteffort-pod19f33dbd_831a_456e_918c_a1c88f5ee80a.slice. Dec 13 15:21:15.075081 kubelet[2067]: W1213 15:21:15.075045 2067 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-fauys.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-fauys.gb1.brightbox.com' and this object Dec 13 15:21:15.075178 kubelet[2067]: E1213 15:21:15.075116 2067 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-fauys.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-fauys.gb1.brightbox.com' and this object Dec 13 15:21:15.075270 kubelet[2067]: W1213 15:21:15.075187 2067 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:srv-fauys.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-fauys.gb1.brightbox.com' and this object Dec 13 15:21:15.075270 kubelet[2067]: E1213 15:21:15.075211 2067 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:srv-fauys.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'srv-fauys.gb1.brightbox.com' and this object Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.095623 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 13 15:21:15.095992 kernel: audit: type=1400 audit(1734103275.092:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.105495 kernel: audit: type=1400 audit(1734103275.092:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.112292 kernel: audit: type=1400 audit(1734103275.092:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.127880 kernel: audit: type=1400 audit(1734103275.092:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.127987 kernel: audit: type=1400 audit(1734103275.092:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.128063 kernel: audit: type=1400 audit(1734103275.092:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.128127 kernel: audit: type=1400 audit(1734103275.092:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.138086 kernel: audit: type=1400 audit(1734103275.092:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.164468 kernel: audit: type=1400 audit(1734103275.092:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.164573 kernel: audit: type=1400 audit(1734103275.092:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.092000 audit: BPF prog-id=109 op=LOAD Dec 13 15:21:15.093000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.093000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2153 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376666316536623632633931326537303333353631396662376132 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2153 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376666316536623632633931326537303333353631396662376132 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.094000 audit: BPF prog-id=110 op=LOAD Dec 13 15:21:15.094000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002184f0 items=0 ppid=2153 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376666316536623632633931326537303333353631396662376132 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.101000 audit: BPF prog-id=111 op=LOAD Dec 13 15:21:15.101000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218538 items=0 ppid=2153 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376666316536623632633931326537303333353631396662376132 Dec 13 15:21:15.104000 audit: BPF prog-id=111 op=UNLOAD Dec 13 15:21:15.104000 audit: BPF prog-id=110 op=UNLOAD Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.104000 audit: BPF prog-id=112 op=LOAD Dec 13 15:21:15.104000 audit[2162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218948 items=0 ppid=2153 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376666316536623632633931326537303333353631396662376132 Dec 13 15:21:15.181297 kubelet[2067]: I1213 15:21:15.181101 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/19f33dbd-831a-456e-918c-a1c88f5ee80a-var-lib-calico\") pod \"tigera-operator-7bc55997bb-2vf78\" (UID: \"19f33dbd-831a-456e-918c-a1c88f5ee80a\") " pod="tigera-operator/tigera-operator-7bc55997bb-2vf78" Dec 13 15:21:15.181297 kubelet[2067]: I1213 15:21:15.181176 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wh4fr\" (UniqueName: \"kubernetes.io/projected/19f33dbd-831a-456e-918c-a1c88f5ee80a-kube-api-access-wh4fr\") pod \"tigera-operator-7bc55997bb-2vf78\" (UID: \"19f33dbd-831a-456e-918c-a1c88f5ee80a\") " pod="tigera-operator/tigera-operator-7bc55997bb-2vf78" Dec 13 15:21:15.183210 env[1191]: time="2024-12-13T15:21:15.183151126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ph9k2,Uid:ec51e1fa-0987-436c-8cc5-388f7b3a061d,Namespace:kube-system,Attempt:0,} returns sandbox id \"457ff1e6b62c912e70335619fb7a237a99235a44b20c9013466e536a92186c63\"" Dec 13 15:21:15.196344 env[1191]: time="2024-12-13T15:21:15.194391739Z" level=info msg="CreateContainer within sandbox \"457ff1e6b62c912e70335619fb7a237a99235a44b20c9013466e536a92186c63\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:21:15.213100 env[1191]: time="2024-12-13T15:21:15.213047137Z" level=info msg="CreateContainer within sandbox \"457ff1e6b62c912e70335619fb7a237a99235a44b20c9013466e536a92186c63\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d3a6c250d70ef02a8d7314262040acc92b23239a3ca98f86d258a8e461db870d\"" Dec 13 15:21:15.214344 env[1191]: time="2024-12-13T15:21:15.214310670Z" level=info msg="StartContainer for \"d3a6c250d70ef02a8d7314262040acc92b23239a3ca98f86d258a8e461db870d\"" Dec 13 15:21:15.241287 systemd[1]: Started cri-containerd-d3a6c250d70ef02a8d7314262040acc92b23239a3ca98f86d258a8e461db870d.scope. Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f5f6ac0a618 items=0 ppid=2153 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613663323530643730656630326138643733313432363230343061 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.283000 audit: BPF prog-id=113 op=LOAD Dec 13 15:21:15.283000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000333d98 items=0 ppid=2153 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613663323530643730656630326138643733313432363230343061 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit: BPF prog-id=114 op=LOAD Dec 13 15:21:15.285000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000333de8 items=0 ppid=2153 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613663323530643730656630326138643733313432363230343061 Dec 13 15:21:15.285000 audit: BPF prog-id=114 op=UNLOAD Dec 13 15:21:15.285000 audit: BPF prog-id=113 op=UNLOAD Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { perfmon } for pid=2194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit[2194]: AVC avc: denied { bpf } for pid=2194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:15.285000 audit: BPF prog-id=115 op=LOAD Dec 13 15:21:15.285000 audit[2194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000333e78 items=0 ppid=2153 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433613663323530643730656630326138643733313432363230343061 Dec 13 15:21:15.316447 env[1191]: time="2024-12-13T15:21:15.316378303Z" level=info msg="StartContainer for \"d3a6c250d70ef02a8d7314262040acc92b23239a3ca98f86d258a8e461db870d\" returns successfully" Dec 13 15:21:15.648000 audit[2247]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.648000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0511b850 a2=0 a3=7ffd0511b83c items=0 ppid=2205 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:21:15.650000 audit[2246]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.654000 audit[2249]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.654000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeadcb1be0 a2=0 a3=7ffeadcb1bcc items=0 ppid=2205 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:21:15.650000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffa32df40 a2=0 a3=7ffffa32df2c items=0 ppid=2205 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:21:15.661000 audit[2251]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.661000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff99715910 a2=0 a3=7fff997158fc items=0 ppid=2205 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:21:15.664000 audit[2250]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.664000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc39e9d70 a2=0 a3=7fffc39e9d5c items=0 ppid=2205 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:21:15.666000 audit[2252]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.666000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff68c27d00 a2=0 a3=7fff68c27cec items=0 ppid=2205 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:21:15.753000 audit[2253]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.753000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffca40c68d0 a2=0 a3=7ffca40c68bc items=0 ppid=2205 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:21:15.759000 audit[2255]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.759000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffda81682a0 a2=0 a3=7ffda816828c items=0 ppid=2205 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:21:15.766000 audit[2258]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.766000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd6dfce180 a2=0 a3=7ffd6dfce16c items=0 ppid=2205 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:21:15.768000 audit[2259]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.768000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd2fa1410 a2=0 a3=7fffd2fa13fc items=0 ppid=2205 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:21:15.773000 audit[2261]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.773000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffafbabdf0 a2=0 a3=7fffafbabddc items=0 ppid=2205 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:21:15.775000 audit[2262]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.775000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe32ea1d00 a2=0 a3=7ffe32ea1cec items=0 ppid=2205 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:21:15.779000 audit[2264]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.779000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda384da10 a2=0 a3=7ffda384d9fc items=0 ppid=2205 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:21:15.788274 systemd[1]: run-containerd-runc-k8s.io-457ff1e6b62c912e70335619fb7a237a99235a44b20c9013466e536a92186c63-runc.5RjVPK.mount: Deactivated successfully. Dec 13 15:21:15.790000 audit[2267]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.790000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe239d3330 a2=0 a3=7ffe239d331c items=0 ppid=2205 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:21:15.793000 audit[2268]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.793000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd276a0450 a2=0 a3=7ffd276a043c items=0 ppid=2205 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:21:15.797000 audit[2270]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.797000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffaba986a0 a2=0 a3=7fffaba9868c items=0 ppid=2205 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:21:15.799000 audit[2271]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.799000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5384c320 a2=0 a3=7ffd5384c30c items=0 ppid=2205 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:21:15.803000 audit[2273]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.803000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff637cdad0 a2=0 a3=7fff637cdabc items=0 ppid=2205 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:21:15.808000 audit[2276]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.808000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3b4935e0 a2=0 a3=7ffe3b4935cc items=0 ppid=2205 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:21:15.814000 audit[2279]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.814000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0e66af20 a2=0 a3=7ffd0e66af0c items=0 ppid=2205 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:21:15.816000 audit[2280]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.816000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffccb80b3f0 a2=0 a3=7ffccb80b3dc items=0 ppid=2205 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:21:15.821000 audit[2282]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.821000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe373ac560 a2=0 a3=7ffe373ac54c items=0 ppid=2205 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:21:15.827000 audit[2285]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.827000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdceb53af0 a2=0 a3=7ffdceb53adc items=0 ppid=2205 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:21:15.829000 audit[2286]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.829000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5584a170 a2=0 a3=7ffe5584a15c items=0 ppid=2205 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:21:15.833000 audit[2288]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:21:15.833000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe9a9a0990 a2=0 a3=7ffe9a9a097c items=0 ppid=2205 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:21:15.872000 audit[2294]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:15.872000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff5c7d92e0 a2=0 a3=7fff5c7d92cc items=0 ppid=2205 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:15.885000 audit[2294]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:15.885000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff5c7d92e0 a2=0 a3=7fff5c7d92cc items=0 ppid=2205 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:15.888000 audit[2300]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.888000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda7c82c40 a2=0 a3=7ffda7c82c2c items=0 ppid=2205 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:21:15.893000 audit[2302]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.893000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9c346110 a2=0 a3=7ffc9c3460fc items=0 ppid=2205 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:21:15.900000 audit[2305]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.900000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffedc2a1fe0 a2=0 a3=7ffedc2a1fcc items=0 ppid=2205 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:21:15.904000 audit[2306]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.904000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7f3ddf20 a2=0 a3=7ffc7f3ddf0c items=0 ppid=2205 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:21:15.908000 audit[2308]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.908000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4b52ff70 a2=0 a3=7fff4b52ff5c items=0 ppid=2205 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:21:15.910000 audit[2309]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.910000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcf075420 a2=0 a3=7ffdcf07540c items=0 ppid=2205 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:21:15.915000 audit[2311]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.915000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc31a9aeb0 a2=0 a3=7ffc31a9ae9c items=0 ppid=2205 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:21:15.920000 audit[2314]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.920000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffce7f47000 a2=0 a3=7ffce7f46fec items=0 ppid=2205 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:21:15.923000 audit[2315]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.923000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb8d079b0 a2=0 a3=7fffb8d0799c items=0 ppid=2205 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:21:15.926000 audit[2317]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.926000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff15c0f730 a2=0 a3=7fff15c0f71c items=0 ppid=2205 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:21:15.928000 audit[2318]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.928000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebccabb10 a2=0 a3=7ffebccabafc items=0 ppid=2205 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:21:15.934000 audit[2320]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.934000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe013ed970 a2=0 a3=7ffe013ed95c items=0 ppid=2205 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:21:15.939000 audit[2323]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.939000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff374e6160 a2=0 a3=7fff374e614c items=0 ppid=2205 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:21:15.944000 audit[2326]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.944000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7efc12e0 a2=0 a3=7ffd7efc12cc items=0 ppid=2205 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:21:15.946000 audit[2327]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.946000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc57a6ec0 a2=0 a3=7ffcc57a6eac items=0 ppid=2205 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.946000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:21:15.952000 audit[2329]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.952000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf9c87bc0 a2=0 a3=7ffdf9c87bac items=0 ppid=2205 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:21:15.961000 audit[2332]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.961000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffff789abb0 a2=0 a3=7ffff789ab9c items=0 ppid=2205 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:21:15.964000 audit[2333]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.964000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbd94e4d0 a2=0 a3=7ffcbd94e4bc items=0 ppid=2205 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:21:15.968000 audit[2335]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.968000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffeb3fe9260 a2=0 a3=7ffeb3fe924c items=0 ppid=2205 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:21:15.970000 audit[2336]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.970000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffea9a2f30 a2=0 a3=7fffea9a2f1c items=0 ppid=2205 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:21:15.974000 audit[2338]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.974000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde2ede650 a2=0 a3=7ffde2ede63c items=0 ppid=2205 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:21:15.991000 audit[2341]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:21:15.991000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd9681fd0 a2=0 a3=7ffcd9681fbc items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:21:15.997000 audit[2343]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:21:15.997000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe25039700 a2=0 a3=7ffe250396ec items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.997000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:15.998000 audit[2343]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:21:15.998000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe25039700 a2=0 a3=7ffe250396ec items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:15.998000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:16.281285 env[1191]: time="2024-12-13T15:21:16.280542685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-2vf78,Uid:19f33dbd-831a-456e-918c-a1c88f5ee80a,Namespace:tigera-operator,Attempt:0,}" Dec 13 15:21:16.315066 env[1191]: time="2024-12-13T15:21:16.314921374Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:21:16.315066 env[1191]: time="2024-12-13T15:21:16.315003179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:21:16.315918 env[1191]: time="2024-12-13T15:21:16.315845357Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:21:16.316418 env[1191]: time="2024-12-13T15:21:16.316268743Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e45663797a52e64291dffd79e04152a59bd4029da37a2ada8d2629e36c863cf pid=2353 runtime=io.containerd.runc.v2 Dec 13 15:21:16.345837 systemd[1]: Started cri-containerd-9e45663797a52e64291dffd79e04152a59bd4029da37a2ada8d2629e36c863cf.scope. Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.388000 audit: BPF prog-id=116 op=LOAD Dec 13 15:21:16.390000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.390000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:16.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343536363337393761353265363432393164666664373965303431 Dec 13 15:21:16.390000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.390000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:16.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343536363337393761353265363432393164666664373965303431 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.391000 audit: BPF prog-id=117 op=LOAD Dec 13 15:21:16.391000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a3c10 items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:16.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343536363337393761353265363432393164666664373965303431 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.392000 audit: BPF prog-id=118 op=LOAD Dec 13 15:21:16.392000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a3c58 items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:16.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343536363337393761353265363432393164666664373965303431 Dec 13 15:21:16.393000 audit: BPF prog-id=118 op=UNLOAD Dec 13 15:21:16.393000 audit: BPF prog-id=117 op=UNLOAD Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:16.394000 audit: BPF prog-id=119 op=LOAD Dec 13 15:21:16.394000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030e068 items=0 ppid=2353 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:16.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343536363337393761353265363432393164666664373965303431 Dec 13 15:21:16.444689 env[1191]: time="2024-12-13T15:21:16.444613173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-2vf78,Uid:19f33dbd-831a-456e-918c-a1c88f5ee80a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9e45663797a52e64291dffd79e04152a59bd4029da37a2ada8d2629e36c863cf\"" Dec 13 15:21:16.448185 env[1191]: time="2024-12-13T15:21:16.448149145Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 15:21:16.787881 systemd[1]: run-containerd-runc-k8s.io-9e45663797a52e64291dffd79e04152a59bd4029da37a2ada8d2629e36c863cf-runc.aLFxMP.mount: Deactivated successfully. Dec 13 15:21:19.923553 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2750427617.mount: Deactivated successfully. Dec 13 15:21:21.728934 env[1191]: time="2024-12-13T15:21:21.728705519Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:21.731891 env[1191]: time="2024-12-13T15:21:21.731838474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:21.737263 env[1191]: time="2024-12-13T15:21:21.734720092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:21.737663 env[1191]: time="2024-12-13T15:21:21.737627436Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:21.739905 env[1191]: time="2024-12-13T15:21:21.738910821Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 15:21:21.745482 env[1191]: time="2024-12-13T15:21:21.745420239Z" level=info msg="CreateContainer within sandbox \"9e45663797a52e64291dffd79e04152a59bd4029da37a2ada8d2629e36c863cf\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 15:21:21.766586 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1356548849.mount: Deactivated successfully. Dec 13 15:21:21.778512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2242945716.mount: Deactivated successfully. Dec 13 15:21:21.783083 env[1191]: time="2024-12-13T15:21:21.782982912Z" level=info msg="CreateContainer within sandbox \"9e45663797a52e64291dffd79e04152a59bd4029da37a2ada8d2629e36c863cf\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ff592d599a7020c353a18929898707dc56f6e3b66c56c804b4cee314b9594b72\"" Dec 13 15:21:21.786112 env[1191]: time="2024-12-13T15:21:21.783989936Z" level=info msg="StartContainer for \"ff592d599a7020c353a18929898707dc56f6e3b66c56c804b4cee314b9594b72\"" Dec 13 15:21:21.829897 systemd[1]: Started cri-containerd-ff592d599a7020c353a18929898707dc56f6e3b66c56c804b4cee314b9594b72.scope. Dec 13 15:21:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.871178 kernel: kauditd_printk_skb: 300 callbacks suppressed Dec 13 15:21:21.871350 kernel: audit: type=1400 audit(1734103281.868:874): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.880947 kernel: audit: type=1400 audit(1734103281.868:875): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885685 kernel: audit: type=1400 audit(1734103281.873:876): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.901838 kernel: audit: type=1400 audit(1734103281.873:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.901941 kernel: audit: type=1400 audit(1734103281.873:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.908245 kernel: audit: type=1400 audit(1734103281.873:879): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.919990 kernel: audit: type=1400 audit(1734103281.873:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.920159 kernel: audit: type=1400 audit(1734103281.873:881): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.926344 kernel: audit: type=1400 audit(1734103281.873:882): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.934279 kernel: audit: type=1400 audit(1734103281.874:883): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.874000 audit: BPF prog-id=120 op=LOAD Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2353 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353932643539396137303230633335336131383932393839383730 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2353 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353932643539396137303230633335336131383932393839383730 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.875000 audit: BPF prog-id=121 op=LOAD Dec 13 15:21:21.875000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003901e0 items=0 ppid=2353 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:21.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353932643539396137303230633335336131383932393839383730 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.885000 audit: BPF prog-id=122 op=LOAD Dec 13 15:21:21.885000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000390228 items=0 ppid=2353 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:21.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353932643539396137303230633335336131383932393839383730 Dec 13 15:21:21.888000 audit: BPF prog-id=122 op=UNLOAD Dec 13 15:21:21.888000 audit: BPF prog-id=121 op=UNLOAD Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:21.888000 audit: BPF prog-id=123 op=LOAD Dec 13 15:21:21.888000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000390638 items=0 ppid=2353 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353932643539396137303230633335336131383932393839383730 Dec 13 15:21:22.002502 env[1191]: time="2024-12-13T15:21:22.002195938Z" level=info msg="StartContainer for \"ff592d599a7020c353a18929898707dc56f6e3b66c56c804b4cee314b9594b72\" returns successfully" Dec 13 15:21:22.647438 kubelet[2067]: I1213 15:21:22.647242 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ph9k2" podStartSLOduration=9.647144565 podStartE2EDuration="9.647144565s" podCreationTimestamp="2024-12-13 15:21:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:21:15.618051145 +0000 UTC m=+15.380807517" watchObservedRunningTime="2024-12-13 15:21:22.647144565 +0000 UTC m=+22.409900943" Dec 13 15:21:22.648355 kubelet[2067]: I1213 15:21:22.647540 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-2vf78" podStartSLOduration=3.352559986 podStartE2EDuration="8.647528947s" podCreationTimestamp="2024-12-13 15:21:14 +0000 UTC" firstStartedPulling="2024-12-13 15:21:16.446912998 +0000 UTC m=+16.209669376" lastFinishedPulling="2024-12-13 15:21:21.741881966 +0000 UTC m=+21.504638337" observedRunningTime="2024-12-13 15:21:22.646559227 +0000 UTC m=+22.409315620" watchObservedRunningTime="2024-12-13 15:21:22.647528947 +0000 UTC m=+22.410285338" Dec 13 15:21:25.188000 audit[2427]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:25.188000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd7492d80 a2=0 a3=7ffcd7492d6c items=0 ppid=2205 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:25.193000 audit[2427]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:25.193000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd7492d80 a2=0 a3=0 items=0 ppid=2205 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:25.206000 audit[2429]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:25.206000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffedb1a8590 a2=0 a3=7ffedb1a857c items=0 ppid=2205 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:25.221000 audit[2429]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:25.221000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffedb1a8590 a2=0 a3=0 items=0 ppid=2205 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:25.376669 kubelet[2067]: I1213 15:21:25.376581 2067 topology_manager.go:215] "Topology Admit Handler" podUID="fe69f101-c529-4a7c-add3-550b2107d0d6" podNamespace="calico-system" podName="calico-typha-5b67544fb4-zxq97" Dec 13 15:21:25.389812 systemd[1]: Created slice kubepods-besteffort-podfe69f101_c529_4a7c_add3_550b2107d0d6.slice. Dec 13 15:21:25.457967 kubelet[2067]: I1213 15:21:25.457779 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-524nr\" (UniqueName: \"kubernetes.io/projected/fe69f101-c529-4a7c-add3-550b2107d0d6-kube-api-access-524nr\") pod \"calico-typha-5b67544fb4-zxq97\" (UID: \"fe69f101-c529-4a7c-add3-550b2107d0d6\") " pod="calico-system/calico-typha-5b67544fb4-zxq97" Dec 13 15:21:25.457967 kubelet[2067]: I1213 15:21:25.457888 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe69f101-c529-4a7c-add3-550b2107d0d6-tigera-ca-bundle\") pod \"calico-typha-5b67544fb4-zxq97\" (UID: \"fe69f101-c529-4a7c-add3-550b2107d0d6\") " pod="calico-system/calico-typha-5b67544fb4-zxq97" Dec 13 15:21:25.458288 kubelet[2067]: I1213 15:21:25.457969 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe69f101-c529-4a7c-add3-550b2107d0d6-typha-certs\") pod \"calico-typha-5b67544fb4-zxq97\" (UID: \"fe69f101-c529-4a7c-add3-550b2107d0d6\") " pod="calico-system/calico-typha-5b67544fb4-zxq97" Dec 13 15:21:25.519823 kubelet[2067]: I1213 15:21:25.519754 2067 topology_manager.go:215] "Topology Admit Handler" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" podNamespace="calico-system" podName="calico-node-4wpgd" Dec 13 15:21:25.529695 systemd[1]: Created slice kubepods-besteffort-pod9e163c88_6f40_4c71_9a70_e72b9498bb1e.slice. Dec 13 15:21:25.558814 kubelet[2067]: I1213 15:21:25.558708 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-lib-calico\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559072 kubelet[2067]: I1213 15:21:25.558861 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-bin-dir\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559072 kubelet[2067]: I1213 15:21:25.558901 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-log-dir\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559072 kubelet[2067]: I1213 15:21:25.559044 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-xtables-lock\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559288 kubelet[2067]: I1213 15:21:25.559147 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-policysync\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559288 kubelet[2067]: I1213 15:21:25.559246 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-lib-modules\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559442 kubelet[2067]: I1213 15:21:25.559286 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9e163c88-6f40-4c71-9a70-e72b9498bb1e-node-certs\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559508 kubelet[2067]: I1213 15:21:25.559439 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mpvbt\" (UniqueName: \"kubernetes.io/projected/9e163c88-6f40-4c71-9a70-e72b9498bb1e-kube-api-access-mpvbt\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559658 kubelet[2067]: I1213 15:21:25.559589 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-run-calico\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559742 kubelet[2067]: I1213 15:21:25.559663 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-flexvol-driver-host\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559742 kubelet[2067]: I1213 15:21:25.559729 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-net-dir\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.559893 kubelet[2067]: I1213 15:21:25.559790 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9e163c88-6f40-4c71-9a70-e72b9498bb1e-tigera-ca-bundle\") pod \"calico-node-4wpgd\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " pod="calico-system/calico-node-4wpgd" Dec 13 15:21:25.651913 kubelet[2067]: I1213 15:21:25.651857 2067 topology_manager.go:215] "Topology Admit Handler" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" podNamespace="calico-system" podName="csi-node-driver-ntbs2" Dec 13 15:21:25.653320 kubelet[2067]: E1213 15:21:25.653285 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:25.663782 kubelet[2067]: E1213 15:21:25.663731 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.663927 kubelet[2067]: W1213 15:21:25.663777 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.663927 kubelet[2067]: E1213 15:21:25.663889 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.672012 kubelet[2067]: E1213 15:21:25.671982 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.672183 kubelet[2067]: W1213 15:21:25.672155 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.672499 kubelet[2067]: E1213 15:21:25.672471 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.702600 env[1191]: time="2024-12-13T15:21:25.701728510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b67544fb4-zxq97,Uid:fe69f101-c529-4a7c-add3-550b2107d0d6,Namespace:calico-system,Attempt:0,}" Dec 13 15:21:25.709379 kubelet[2067]: E1213 15:21:25.709214 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.709579 kubelet[2067]: W1213 15:21:25.709529 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.710323 kubelet[2067]: E1213 15:21:25.710295 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.738820 kubelet[2067]: E1213 15:21:25.737951 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.738820 kubelet[2067]: W1213 15:21:25.737985 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.738820 kubelet[2067]: E1213 15:21:25.738014 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.738820 kubelet[2067]: E1213 15:21:25.738307 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.738820 kubelet[2067]: W1213 15:21:25.738322 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.738820 kubelet[2067]: E1213 15:21:25.738338 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.738820 kubelet[2067]: E1213 15:21:25.738596 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.738820 kubelet[2067]: W1213 15:21:25.738610 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.738820 kubelet[2067]: E1213 15:21:25.738629 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.739813 kubelet[2067]: E1213 15:21:25.739658 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.739813 kubelet[2067]: W1213 15:21:25.739677 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.739813 kubelet[2067]: E1213 15:21:25.739693 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.740632 kubelet[2067]: E1213 15:21:25.740148 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.740632 kubelet[2067]: W1213 15:21:25.740167 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.740632 kubelet[2067]: E1213 15:21:25.740183 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.740632 kubelet[2067]: E1213 15:21:25.740491 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.740632 kubelet[2067]: W1213 15:21:25.740504 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.740632 kubelet[2067]: E1213 15:21:25.740518 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.741521 kubelet[2067]: E1213 15:21:25.741277 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.741521 kubelet[2067]: W1213 15:21:25.741295 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.741521 kubelet[2067]: E1213 15:21:25.741319 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.742256 kubelet[2067]: E1213 15:21:25.742077 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.742256 kubelet[2067]: W1213 15:21:25.742094 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.742256 kubelet[2067]: E1213 15:21:25.742111 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.742772 kubelet[2067]: E1213 15:21:25.742707 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.743083 kubelet[2067]: W1213 15:21:25.743002 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.743083 kubelet[2067]: E1213 15:21:25.743030 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.745418 env[1191]: time="2024-12-13T15:21:25.745205247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:21:25.745552 env[1191]: time="2024-12-13T15:21:25.745509142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:21:25.745630 env[1191]: time="2024-12-13T15:21:25.745575426Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:21:25.745954 kubelet[2067]: E1213 15:21:25.745796 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.745954 kubelet[2067]: W1213 15:21:25.745814 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.745954 kubelet[2067]: E1213 15:21:25.745830 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.746292 env[1191]: time="2024-12-13T15:21:25.745969319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e373334f0286734337107c304fddc0313827063cb53d4824969eb98b94b0c508 pid=2443 runtime=io.containerd.runc.v2 Dec 13 15:21:25.746762 kubelet[2067]: E1213 15:21:25.746615 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.746762 kubelet[2067]: W1213 15:21:25.746634 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.746762 kubelet[2067]: E1213 15:21:25.746690 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.748825 kubelet[2067]: E1213 15:21:25.748687 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.748825 kubelet[2067]: W1213 15:21:25.748705 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.748825 kubelet[2067]: E1213 15:21:25.748722 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.753924 kubelet[2067]: E1213 15:21:25.753899 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.754099 kubelet[2067]: W1213 15:21:25.754071 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.754245 kubelet[2067]: E1213 15:21:25.754204 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.755018 kubelet[2067]: E1213 15:21:25.754994 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.755198 kubelet[2067]: W1213 15:21:25.755160 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.755385 kubelet[2067]: E1213 15:21:25.755351 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.756087 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.757680 kubelet[2067]: W1213 15:21:25.756122 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.756153 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.756440 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.757680 kubelet[2067]: W1213 15:21:25.756455 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.756474 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.756769 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.757680 kubelet[2067]: W1213 15:21:25.756784 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.756799 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.757680 kubelet[2067]: E1213 15:21:25.757137 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.758361 kubelet[2067]: W1213 15:21:25.757161 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.758361 kubelet[2067]: E1213 15:21:25.757178 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.758361 kubelet[2067]: E1213 15:21:25.757506 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.758361 kubelet[2067]: W1213 15:21:25.757522 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.758361 kubelet[2067]: E1213 15:21:25.757540 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.758361 kubelet[2067]: E1213 15:21:25.758072 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.758361 kubelet[2067]: W1213 15:21:25.758087 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.758361 kubelet[2067]: E1213 15:21:25.758104 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.762910 kubelet[2067]: E1213 15:21:25.762885 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.763092 kubelet[2067]: W1213 15:21:25.763065 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.763261 kubelet[2067]: E1213 15:21:25.763234 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.763490 kubelet[2067]: I1213 15:21:25.763449 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/68399294-9c0a-4ef3-b240-417363b4cedc-socket-dir\") pod \"csi-node-driver-ntbs2\" (UID: \"68399294-9c0a-4ef3-b240-417363b4cedc\") " pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:25.766608 kubelet[2067]: E1213 15:21:25.766571 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.766608 kubelet[2067]: W1213 15:21:25.766603 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.766782 kubelet[2067]: E1213 15:21:25.766635 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.766989 kubelet[2067]: E1213 15:21:25.766960 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.766989 kubelet[2067]: W1213 15:21:25.766982 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.767135 kubelet[2067]: E1213 15:21:25.766999 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.767461 kubelet[2067]: E1213 15:21:25.767433 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.767461 kubelet[2067]: W1213 15:21:25.767454 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.767618 kubelet[2067]: E1213 15:21:25.767470 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.767618 kubelet[2067]: I1213 15:21:25.767516 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/68399294-9c0a-4ef3-b240-417363b4cedc-registration-dir\") pod \"csi-node-driver-ntbs2\" (UID: \"68399294-9c0a-4ef3-b240-417363b4cedc\") " pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:25.769205 kubelet[2067]: E1213 15:21:25.767786 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.769205 kubelet[2067]: W1213 15:21:25.767810 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.769205 kubelet[2067]: E1213 15:21:25.767835 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.769205 kubelet[2067]: I1213 15:21:25.767875 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qgm5p\" (UniqueName: \"kubernetes.io/projected/68399294-9c0a-4ef3-b240-417363b4cedc-kube-api-access-qgm5p\") pod \"csi-node-driver-ntbs2\" (UID: \"68399294-9c0a-4ef3-b240-417363b4cedc\") " pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:25.769205 kubelet[2067]: E1213 15:21:25.768137 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.769205 kubelet[2067]: W1213 15:21:25.768153 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.769205 kubelet[2067]: E1213 15:21:25.768169 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.769205 kubelet[2067]: I1213 15:21:25.768193 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/68399294-9c0a-4ef3-b240-417363b4cedc-kubelet-dir\") pod \"csi-node-driver-ntbs2\" (UID: \"68399294-9c0a-4ef3-b240-417363b4cedc\") " pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:25.769205 kubelet[2067]: E1213 15:21:25.768442 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.769755 kubelet[2067]: W1213 15:21:25.768457 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.769755 kubelet[2067]: E1213 15:21:25.768472 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.769755 kubelet[2067]: I1213 15:21:25.768494 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/68399294-9c0a-4ef3-b240-417363b4cedc-varrun\") pod \"csi-node-driver-ntbs2\" (UID: \"68399294-9c0a-4ef3-b240-417363b4cedc\") " pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:25.769755 kubelet[2067]: E1213 15:21:25.768853 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.769755 kubelet[2067]: W1213 15:21:25.768871 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.769755 kubelet[2067]: E1213 15:21:25.768886 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.769755 kubelet[2067]: E1213 15:21:25.769105 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.769755 kubelet[2067]: W1213 15:21:25.769120 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.769755 kubelet[2067]: E1213 15:21:25.769135 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.770349 kubelet[2067]: E1213 15:21:25.769424 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.770349 kubelet[2067]: W1213 15:21:25.769439 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.770349 kubelet[2067]: E1213 15:21:25.769454 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.771030 kubelet[2067]: E1213 15:21:25.771001 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.771030 kubelet[2067]: W1213 15:21:25.771023 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.771180 kubelet[2067]: E1213 15:21:25.771039 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.772207 kubelet[2067]: E1213 15:21:25.771405 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.772207 kubelet[2067]: W1213 15:21:25.771426 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.772207 kubelet[2067]: E1213 15:21:25.771452 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.772207 kubelet[2067]: E1213 15:21:25.771683 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.772207 kubelet[2067]: W1213 15:21:25.771697 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.772207 kubelet[2067]: E1213 15:21:25.771715 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.772207 kubelet[2067]: E1213 15:21:25.771964 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.772207 kubelet[2067]: W1213 15:21:25.771978 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.772207 kubelet[2067]: E1213 15:21:25.771993 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.772737 kubelet[2067]: E1213 15:21:25.772311 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.772737 kubelet[2067]: W1213 15:21:25.772334 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.772737 kubelet[2067]: E1213 15:21:25.772349 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.799889 systemd[1]: Started cri-containerd-e373334f0286734337107c304fddc0313827063cb53d4824969eb98b94b0c508.scope. Dec 13 15:21:25.837013 env[1191]: time="2024-12-13T15:21:25.836934361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4wpgd,Uid:9e163c88-6f40-4c71-9a70-e72b9498bb1e,Namespace:calico-system,Attempt:0,}" Dec 13 15:21:25.870774 kubelet[2067]: E1213 15:21:25.870717 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.870774 kubelet[2067]: W1213 15:21:25.870757 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.871076 kubelet[2067]: E1213 15:21:25.870790 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.871245 kubelet[2067]: E1213 15:21:25.871203 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.871245 kubelet[2067]: W1213 15:21:25.871244 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.871413 kubelet[2067]: E1213 15:21:25.871273 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.871622 kubelet[2067]: E1213 15:21:25.871575 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.871622 kubelet[2067]: W1213 15:21:25.871597 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.871622 kubelet[2067]: E1213 15:21:25.871623 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.872004 kubelet[2067]: E1213 15:21:25.871949 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.872004 kubelet[2067]: W1213 15:21:25.871970 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.872004 kubelet[2067]: E1213 15:21:25.871987 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.872509 kubelet[2067]: E1213 15:21:25.872287 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.872509 kubelet[2067]: W1213 15:21:25.872328 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.872509 kubelet[2067]: E1213 15:21:25.872345 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.873423 kubelet[2067]: E1213 15:21:25.872852 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.873423 kubelet[2067]: W1213 15:21:25.872884 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.873423 kubelet[2067]: E1213 15:21:25.872916 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.873423 kubelet[2067]: E1213 15:21:25.873281 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.873423 kubelet[2067]: W1213 15:21:25.873296 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.873423 kubelet[2067]: E1213 15:21:25.873336 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.874031 kubelet[2067]: E1213 15:21:25.873869 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.874031 kubelet[2067]: W1213 15:21:25.873887 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.874031 kubelet[2067]: E1213 15:21:25.873927 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.874566 kubelet[2067]: E1213 15:21:25.874409 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.874566 kubelet[2067]: W1213 15:21:25.874427 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.880243 kubelet[2067]: E1213 15:21:25.875503 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.880604 kubelet[2067]: E1213 15:21:25.880446 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.880604 kubelet[2067]: W1213 15:21:25.880466 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.880604 kubelet[2067]: E1213 15:21:25.880518 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.881074 kubelet[2067]: E1213 15:21:25.880919 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.881074 kubelet[2067]: W1213 15:21:25.880936 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.881074 kubelet[2067]: E1213 15:21:25.880984 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.881568 kubelet[2067]: E1213 15:21:25.881407 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.881568 kubelet[2067]: W1213 15:21:25.881425 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.881568 kubelet[2067]: E1213 15:21:25.881463 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.881989 kubelet[2067]: E1213 15:21:25.881821 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.881989 kubelet[2067]: W1213 15:21:25.881838 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.881989 kubelet[2067]: E1213 15:21:25.881904 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.882484 kubelet[2067]: E1213 15:21:25.882330 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.882484 kubelet[2067]: W1213 15:21:25.882348 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.882484 kubelet[2067]: E1213 15:21:25.882400 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.882962 kubelet[2067]: E1213 15:21:25.882804 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.882962 kubelet[2067]: W1213 15:21:25.882821 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.882962 kubelet[2067]: E1213 15:21:25.882878 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.889253 kubelet[2067]: E1213 15:21:25.883314 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.889253 kubelet[2067]: W1213 15:21:25.883333 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.889253 kubelet[2067]: E1213 15:21:25.883402 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.889965 kubelet[2067]: E1213 15:21:25.889650 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.889965 kubelet[2067]: W1213 15:21:25.889679 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.889965 kubelet[2067]: E1213 15:21:25.889791 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.890582 kubelet[2067]: E1213 15:21:25.890301 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.890582 kubelet[2067]: W1213 15:21:25.890320 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.890582 kubelet[2067]: E1213 15:21:25.890414 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.891076 kubelet[2067]: E1213 15:21:25.890883 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.891076 kubelet[2067]: W1213 15:21:25.890902 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.891076 kubelet[2067]: E1213 15:21:25.890995 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.896767 kubelet[2067]: E1213 15:21:25.896709 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.903427 env[1191]: time="2024-12-13T15:21:25.889739360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:21:25.903427 env[1191]: time="2024-12-13T15:21:25.889856073Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:21:25.903427 env[1191]: time="2024-12-13T15:21:25.889938847Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:21:25.903427 env[1191]: time="2024-12-13T15:21:25.891160516Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f pid=2509 runtime=io.containerd.runc.v2 Dec 13 15:21:25.903919 kubelet[2067]: W1213 15:21:25.903873 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.904193 kubelet[2067]: E1213 15:21:25.904126 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.904546 kubelet[2067]: E1213 15:21:25.904523 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.904698 kubelet[2067]: W1213 15:21:25.904673 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.904861 kubelet[2067]: E1213 15:21:25.904814 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.905268 kubelet[2067]: E1213 15:21:25.905245 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.905417 kubelet[2067]: W1213 15:21:25.905391 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.905599 kubelet[2067]: E1213 15:21:25.905563 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.906025 kubelet[2067]: E1213 15:21:25.906003 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.906161 kubelet[2067]: W1213 15:21:25.906136 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.910777 kubelet[2067]: E1213 15:21:25.910742 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.910969 kubelet[2067]: W1213 15:21:25.910926 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.911278 kubelet[2067]: E1213 15:21:25.911213 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.911375 kubelet[2067]: E1213 15:21:25.911301 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.911623 kubelet[2067]: E1213 15:21:25.911599 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.911757 kubelet[2067]: W1213 15:21:25.911731 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.911907 kubelet[2067]: E1213 15:21:25.911877 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.928133 systemd[1]: Started cri-containerd-1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f.scope. Dec 13 15:21:25.941514 kubelet[2067]: E1213 15:21:25.941474 2067 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:21:25.941748 kubelet[2067]: W1213 15:21:25.941719 2067 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:21:25.941897 kubelet[2067]: E1213 15:21:25.941863 2067 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.992000 audit: BPF prog-id=124 op=LOAD Dec 13 15:21:25.993000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.993000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2443 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373333333466303238363733343333373130376333303466646463 Dec 13 15:21:25.993000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.993000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2443 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373333333466303238363733343333373130376333303466646463 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.994000 audit: BPF prog-id=125 op=LOAD Dec 13 15:21:25.994000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000264250 items=0 ppid=2443 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373333333466303238363733343333373130376333303466646463 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:25.999000 audit: BPF prog-id=126 op=LOAD Dec 13 15:21:25.999000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000264298 items=0 ppid=2443 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:25.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373333333466303238363733343333373130376333303466646463 Dec 13 15:21:26.000000 audit: BPF prog-id=126 op=UNLOAD Dec 13 15:21:26.001000 audit: BPF prog-id=125 op=UNLOAD Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.001000 audit: BPF prog-id=127 op=LOAD Dec 13 15:21:26.001000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002646a8 items=0 ppid=2443 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373333333466303238363733343333373130376333303466646463 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.043000 audit: BPF prog-id=128 op=LOAD Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2509 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162316463336464333333626537383630356666333739373139633535 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2509 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162316463336464333333626537383630356666333739373139633535 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit: BPF prog-id=129 op=LOAD Dec 13 15:21:26.044000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024ef0 items=0 ppid=2509 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162316463336464333333626537383630356666333739373139633535 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit: BPF prog-id=130 op=LOAD Dec 13 15:21:26.044000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024f38 items=0 ppid=2509 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162316463336464333333626537383630356666333739373139633535 Dec 13 15:21:26.044000 audit: BPF prog-id=130 op=UNLOAD Dec 13 15:21:26.044000 audit: BPF prog-id=129 op=UNLOAD Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:26.044000 audit: BPF prog-id=131 op=LOAD Dec 13 15:21:26.044000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025348 items=0 ppid=2509 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162316463336464333333626537383630356666333739373139633535 Dec 13 15:21:26.118853 env[1191]: time="2024-12-13T15:21:26.118769500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4wpgd,Uid:9e163c88-6f40-4c71-9a70-e72b9498bb1e,Namespace:calico-system,Attempt:0,} returns sandbox id \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\"" Dec 13 15:21:26.121875 env[1191]: time="2024-12-13T15:21:26.121828259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:21:26.159423 env[1191]: time="2024-12-13T15:21:26.159332200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b67544fb4-zxq97,Uid:fe69f101-c529-4a7c-add3-550b2107d0d6,Namespace:calico-system,Attempt:0,} returns sandbox id \"e373334f0286734337107c304fddc0313827063cb53d4824969eb98b94b0c508\"" Dec 13 15:21:26.254000 audit[2582]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:26.254000 audit[2582]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff1a91d470 a2=0 a3=7fff1a91d45c items=0 ppid=2205 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:26.258000 audit[2582]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:26.258000 audit[2582]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1a91d470 a2=0 a3=0 items=0 ppid=2205 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:26.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:27.490731 kubelet[2067]: E1213 15:21:27.490604 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:27.878381 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1294405479.mount: Deactivated successfully. Dec 13 15:21:28.117259 env[1191]: time="2024-12-13T15:21:28.117135240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:28.119195 env[1191]: time="2024-12-13T15:21:28.119148392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:28.121749 env[1191]: time="2024-12-13T15:21:28.121697119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:28.123835 env[1191]: time="2024-12-13T15:21:28.123785011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:28.124638 env[1191]: time="2024-12-13T15:21:28.124591927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:21:28.130977 env[1191]: time="2024-12-13T15:21:28.130830903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 15:21:28.132697 env[1191]: time="2024-12-13T15:21:28.132152898Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:21:28.149459 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3155948533.mount: Deactivated successfully. Dec 13 15:21:28.155552 env[1191]: time="2024-12-13T15:21:28.155465032Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603\"" Dec 13 15:21:28.157964 env[1191]: time="2024-12-13T15:21:28.157920033Z" level=info msg="StartContainer for \"0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603\"" Dec 13 15:21:28.207463 systemd[1]: Started cri-containerd-0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603.scope. Dec 13 15:21:28.252877 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 15:21:28.253248 kernel: audit: type=1400 audit(1734103288.241:934): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8ee0fb00a8 items=0 ppid=2509 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:28.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343464613761353861633266333362656635363731356466613433 Dec 13 15:21:28.268700 kernel: audit: type=1300 audit(1734103288.241:934): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8ee0fb00a8 items=0 ppid=2509 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:28.269012 kernel: audit: type=1327 audit(1734103288.241:934): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343464613761353861633266333362656635363731356466613433 Dec 13 15:21:28.269097 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.280244 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.286251 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.286346 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.301258 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.311257 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.319443 kernel: audit: type=1400 audit(1734103288.241:935): avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit: BPF prog-id=132 op=LOAD Dec 13 15:21:28.241000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f89f8 items=0 ppid=2509 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:28.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343464613761353861633266333362656635363731356466613433 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit: BPF prog-id=133 op=LOAD Dec 13 15:21:28.241000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8a48 items=0 ppid=2509 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:28.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343464613761353861633266333362656635363731356466613433 Dec 13 15:21:28.241000 audit: BPF prog-id=133 op=UNLOAD Dec 13 15:21:28.241000 audit: BPF prog-id=132 op=UNLOAD Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:28.241000 audit: BPF prog-id=134 op=LOAD Dec 13 15:21:28.241000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8ad8 items=0 ppid=2509 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:28.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343464613761353861633266333362656635363731356466613433 Dec 13 15:21:28.334119 env[1191]: time="2024-12-13T15:21:28.334049203Z" level=info msg="StartContainer for \"0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603\" returns successfully" Dec 13 15:21:28.360411 systemd[1]: cri-containerd-0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603.scope: Deactivated successfully. Dec 13 15:21:28.362000 audit: BPF prog-id=134 op=UNLOAD Dec 13 15:21:28.453404 env[1191]: time="2024-12-13T15:21:28.451854349Z" level=info msg="shim disconnected" id=0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603 Dec 13 15:21:28.453404 env[1191]: time="2024-12-13T15:21:28.451938756Z" level=warning msg="cleaning up after shim disconnected" id=0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603 namespace=k8s.io Dec 13 15:21:28.453404 env[1191]: time="2024-12-13T15:21:28.451967903Z" level=info msg="cleaning up dead shim" Dec 13 15:21:28.465418 env[1191]: time="2024-12-13T15:21:28.465320200Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:21:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2630 runtime=io.containerd.runc.v2\n" Dec 13 15:21:28.777543 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603-rootfs.mount: Deactivated successfully. Dec 13 15:21:29.489901 kubelet[2067]: E1213 15:21:29.489831 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:31.484706 env[1191]: time="2024-12-13T15:21:31.484589519Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:31.487318 env[1191]: time="2024-12-13T15:21:31.487270364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:31.489935 env[1191]: time="2024-12-13T15:21:31.489872428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:31.493375 kubelet[2067]: E1213 15:21:31.490915 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:31.493886 env[1191]: time="2024-12-13T15:21:31.493081109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:31.494136 env[1191]: time="2024-12-13T15:21:31.494013111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 15:21:31.502673 env[1191]: time="2024-12-13T15:21:31.501281824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:21:31.526915 env[1191]: time="2024-12-13T15:21:31.526843446Z" level=info msg="CreateContainer within sandbox \"e373334f0286734337107c304fddc0313827063cb53d4824969eb98b94b0c508\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 15:21:31.544093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3292137583.mount: Deactivated successfully. Dec 13 15:21:31.548565 env[1191]: time="2024-12-13T15:21:31.548517277Z" level=info msg="CreateContainer within sandbox \"e373334f0286734337107c304fddc0313827063cb53d4824969eb98b94b0c508\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3dc6cddefbb2372fd76354cf0bc02c5d69156ebe7352a05ca1c1b200b7698c17\"" Dec 13 15:21:31.551134 env[1191]: time="2024-12-13T15:21:31.551097939Z" level=info msg="StartContainer for \"3dc6cddefbb2372fd76354cf0bc02c5d69156ebe7352a05ca1c1b200b7698c17\"" Dec 13 15:21:31.584135 systemd[1]: Started cri-containerd-3dc6cddefbb2372fd76354cf0bc02c5d69156ebe7352a05ca1c1b200b7698c17.scope. Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.628000 audit: BPF prog-id=135 op=LOAD Dec 13 15:21:31.630000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.630000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2443 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:31.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633663646465666262323337326664373633353463663062633032 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2443 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633663646465666262323337326664373633353463663062633032 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.631000 audit: BPF prog-id=136 op=LOAD Dec 13 15:21:31.631000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030d390 items=0 ppid=2443 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:31.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633663646465666262323337326664373633353463663062633032 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.634000 audit: BPF prog-id=137 op=LOAD Dec 13 15:21:31.634000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030d3d8 items=0 ppid=2443 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:31.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633663646465666262323337326664373633353463663062633032 Dec 13 15:21:31.635000 audit: BPF prog-id=137 op=UNLOAD Dec 13 15:21:31.635000 audit: BPF prog-id=136 op=UNLOAD Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:31.635000 audit: BPF prog-id=138 op=LOAD Dec 13 15:21:31.635000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030d7e8 items=0 ppid=2443 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:31.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633663646465666262323337326664373633353463663062633032 Dec 13 15:21:31.689818 env[1191]: time="2024-12-13T15:21:31.689751706Z" level=info msg="StartContainer for \"3dc6cddefbb2372fd76354cf0bc02c5d69156ebe7352a05ca1c1b200b7698c17\" returns successfully" Dec 13 15:21:33.490950 kubelet[2067]: E1213 15:21:33.490832 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:33.673364 kubelet[2067]: I1213 15:21:33.673270 2067 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:21:35.489990 kubelet[2067]: E1213 15:21:35.489796 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:37.490026 kubelet[2067]: E1213 15:21:37.489909 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:39.063991 env[1191]: time="2024-12-13T15:21:39.063879346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:39.066564 env[1191]: time="2024-12-13T15:21:39.066495040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:39.068397 env[1191]: time="2024-12-13T15:21:39.068363479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:39.070181 env[1191]: time="2024-12-13T15:21:39.070139809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:39.071202 env[1191]: time="2024-12-13T15:21:39.071158964Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:21:39.080867 env[1191]: time="2024-12-13T15:21:39.080789318Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:21:39.104204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1895699128.mount: Deactivated successfully. Dec 13 15:21:39.110890 env[1191]: time="2024-12-13T15:21:39.110809239Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5\"" Dec 13 15:21:39.112738 env[1191]: time="2024-12-13T15:21:39.112701379Z" level=info msg="StartContainer for \"e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5\"" Dec 13 15:21:39.161403 systemd[1]: run-containerd-runc-k8s.io-e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5-runc.dtcbIm.mount: Deactivated successfully. Dec 13 15:21:39.169623 systemd[1]: Started cri-containerd-e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5.scope. Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.217933 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 15:21:39.218066 kernel: audit: type=1400 audit(1734103299.212:959): avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f501c9a7aa8 items=0 ppid=2509 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.230335 kernel: audit: type=1300 audit(1734103299.212:959): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f501c9a7aa8 items=0 ppid=2509 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636639313038313062643536646339323837646139386133373937 Dec 13 15:21:39.243253 kernel: audit: type=1327 audit(1734103299.212:959): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636639313038313062643536646339323837646139386133373937 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.254444 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.254609 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.262614 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.262787 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.270241 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.272536 env[1191]: time="2024-12-13T15:21:39.272479202Z" level=info msg="StartContainer for \"e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5\" returns successfully" Dec 13 15:21:39.276241 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.282340 kernel: audit: type=1400 audit(1734103299.212:960): avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit: BPF prog-id=139 op=LOAD Dec 13 15:21:39.212000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0000dfba8 items=0 ppid=2509 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636639313038313062643536646339323837646139386133373937 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit: BPF prog-id=140 op=LOAD Dec 13 15:21:39.212000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0000dfbf8 items=0 ppid=2509 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636639313038313062643536646339323837646139386133373937 Dec 13 15:21:39.212000 audit: BPF prog-id=140 op=UNLOAD Dec 13 15:21:39.212000 audit: BPF prog-id=139 op=UNLOAD Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:39.212000 audit: BPF prog-id=141 op=LOAD Dec 13 15:21:39.212000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0000dfc88 items=0 ppid=2509 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534636639313038313062643536646339323837646139386133373937 Dec 13 15:21:39.325670 kubelet[2067]: I1213 15:21:39.325523 2067 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:21:39.374477 kubelet[2067]: I1213 15:21:39.374373 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5b67544fb4-zxq97" podStartSLOduration=9.038660202 podStartE2EDuration="14.37433697s" podCreationTimestamp="2024-12-13 15:21:25 +0000 UTC" firstStartedPulling="2024-12-13 15:21:26.161462956 +0000 UTC m=+25.924219328" lastFinishedPulling="2024-12-13 15:21:31.49713972 +0000 UTC m=+31.259896096" observedRunningTime="2024-12-13 15:21:32.690821158 +0000 UTC m=+32.453577534" watchObservedRunningTime="2024-12-13 15:21:39.37433697 +0000 UTC m=+39.137093353" Dec 13 15:21:39.481000 audit[2722]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:39.481000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdf51aea20 a2=0 a3=7ffdf51aea0c items=0 ppid=2205 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:39.486000 audit[2722]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:21:39.486000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdf51aea20 a2=0 a3=7ffdf51aea0c items=0 ppid=2205 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:39.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:21:39.489747 kubelet[2067]: E1213 15:21:39.489681 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:40.356488 env[1191]: time="2024-12-13T15:21:40.356372898Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:21:40.360608 systemd[1]: cri-containerd-e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5.scope: Deactivated successfully. Dec 13 15:21:40.365000 audit: BPF prog-id=141 op=UNLOAD Dec 13 15:21:40.397973 kubelet[2067]: I1213 15:21:40.397919 2067 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:21:40.414298 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5-rootfs.mount: Deactivated successfully. Dec 13 15:21:40.427966 env[1191]: time="2024-12-13T15:21:40.427859938Z" level=info msg="shim disconnected" id=e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5 Dec 13 15:21:40.428257 env[1191]: time="2024-12-13T15:21:40.427982161Z" level=warning msg="cleaning up after shim disconnected" id=e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5 namespace=k8s.io Dec 13 15:21:40.428257 env[1191]: time="2024-12-13T15:21:40.428003937Z" level=info msg="cleaning up dead shim" Dec 13 15:21:40.447542 env[1191]: time="2024-12-13T15:21:40.447463382Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:21:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2737 runtime=io.containerd.runc.v2\n" Dec 13 15:21:40.486536 kubelet[2067]: I1213 15:21:40.485236 2067 topology_manager.go:215] "Topology Admit Handler" podUID="426bdb98-dfef-400a-ae3c-4abfc89d28e3" podNamespace="kube-system" podName="coredns-7db6d8ff4d-5x5kh" Dec 13 15:21:40.498031 systemd[1]: Created slice kubepods-burstable-pod426bdb98_dfef_400a_ae3c_4abfc89d28e3.slice. Dec 13 15:21:40.504686 kubelet[2067]: I1213 15:21:40.504638 2067 topology_manager.go:215] "Topology Admit Handler" podUID="efdc3177-eaa3-4e0c-afc0-67a85ecb2c20" podNamespace="kube-system" podName="coredns-7db6d8ff4d-k4pvk" Dec 13 15:21:40.509861 kubelet[2067]: I1213 15:21:40.509813 2067 topology_manager.go:215] "Topology Admit Handler" podUID="b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58" podNamespace="calico-system" podName="calico-kube-controllers-5d5bbcbf99-x7fg2" Dec 13 15:21:40.513708 systemd[1]: Created slice kubepods-burstable-podefdc3177_eaa3_4e0c_afc0_67a85ecb2c20.slice. Dec 13 15:21:40.519285 kubelet[2067]: I1213 15:21:40.518405 2067 topology_manager.go:215] "Topology Admit Handler" podUID="2bb0905e-c268-4464-a7d2-c59f58942d08" podNamespace="calico-apiserver" podName="calico-apiserver-998f79f5-llk82" Dec 13 15:21:40.525442 systemd[1]: Created slice kubepods-besteffort-podb9f53d0e_450a_4b47_9dd9_5bd5a90cbd58.slice. Dec 13 15:21:40.533132 systemd[1]: Created slice kubepods-besteffort-pod2bb0905e_c268_4464_a7d2_c59f58942d08.slice. Dec 13 15:21:40.535752 kubelet[2067]: I1213 15:21:40.535711 2067 topology_manager.go:215] "Topology Admit Handler" podUID="fd6e7687-a4ca-4889-bf8c-35b9181fe8d6" podNamespace="calico-apiserver" podName="calico-apiserver-998f79f5-lwhwc" Dec 13 15:21:40.546429 systemd[1]: Created slice kubepods-besteffort-podfd6e7687_a4ca_4889_bf8c_35b9181fe8d6.slice. Dec 13 15:21:40.593363 kubelet[2067]: I1213 15:21:40.593304 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/efdc3177-eaa3-4e0c-afc0-67a85ecb2c20-config-volume\") pod \"coredns-7db6d8ff4d-k4pvk\" (UID: \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\") " pod="kube-system/coredns-7db6d8ff4d-k4pvk" Dec 13 15:21:40.593583 kubelet[2067]: I1213 15:21:40.593365 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/426bdb98-dfef-400a-ae3c-4abfc89d28e3-config-volume\") pod \"coredns-7db6d8ff4d-5x5kh\" (UID: \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\") " pod="kube-system/coredns-7db6d8ff4d-5x5kh" Dec 13 15:21:40.593583 kubelet[2067]: I1213 15:21:40.593423 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dpvvh\" (UniqueName: \"kubernetes.io/projected/efdc3177-eaa3-4e0c-afc0-67a85ecb2c20-kube-api-access-dpvvh\") pod \"coredns-7db6d8ff4d-k4pvk\" (UID: \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\") " pod="kube-system/coredns-7db6d8ff4d-k4pvk" Dec 13 15:21:40.593583 kubelet[2067]: I1213 15:21:40.593478 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2bb0905e-c268-4464-a7d2-c59f58942d08-calico-apiserver-certs\") pod \"calico-apiserver-998f79f5-llk82\" (UID: \"2bb0905e-c268-4464-a7d2-c59f58942d08\") " pod="calico-apiserver/calico-apiserver-998f79f5-llk82" Dec 13 15:21:40.593583 kubelet[2067]: I1213 15:21:40.593515 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlwkw\" (UniqueName: \"kubernetes.io/projected/b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58-kube-api-access-tlwkw\") pod \"calico-kube-controllers-5d5bbcbf99-x7fg2\" (UID: \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\") " pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" Dec 13 15:21:40.593583 kubelet[2067]: I1213 15:21:40.593568 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fd6e7687-a4ca-4889-bf8c-35b9181fe8d6-calico-apiserver-certs\") pod \"calico-apiserver-998f79f5-lwhwc\" (UID: \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\") " pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" Dec 13 15:21:40.593987 kubelet[2067]: I1213 15:21:40.593600 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xvzq5\" (UniqueName: \"kubernetes.io/projected/fd6e7687-a4ca-4889-bf8c-35b9181fe8d6-kube-api-access-xvzq5\") pod \"calico-apiserver-998f79f5-lwhwc\" (UID: \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\") " pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" Dec 13 15:21:40.593987 kubelet[2067]: I1213 15:21:40.593654 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dh67p\" (UniqueName: \"kubernetes.io/projected/426bdb98-dfef-400a-ae3c-4abfc89d28e3-kube-api-access-dh67p\") pod \"coredns-7db6d8ff4d-5x5kh\" (UID: \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\") " pod="kube-system/coredns-7db6d8ff4d-5x5kh" Dec 13 15:21:40.593987 kubelet[2067]: I1213 15:21:40.593684 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58-tigera-ca-bundle\") pod \"calico-kube-controllers-5d5bbcbf99-x7fg2\" (UID: \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\") " pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" Dec 13 15:21:40.593987 kubelet[2067]: I1213 15:21:40.593734 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f627d\" (UniqueName: \"kubernetes.io/projected/2bb0905e-c268-4464-a7d2-c59f58942d08-kube-api-access-f627d\") pod \"calico-apiserver-998f79f5-llk82\" (UID: \"2bb0905e-c268-4464-a7d2-c59f58942d08\") " pod="calico-apiserver/calico-apiserver-998f79f5-llk82" Dec 13 15:21:40.711956 env[1191]: time="2024-12-13T15:21:40.709201927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:21:40.805690 env[1191]: time="2024-12-13T15:21:40.804734210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5x5kh,Uid:426bdb98-dfef-400a-ae3c-4abfc89d28e3,Namespace:kube-system,Attempt:0,}" Dec 13 15:21:40.840302 env[1191]: time="2024-12-13T15:21:40.840201889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-llk82,Uid:2bb0905e-c268-4464-a7d2-c59f58942d08,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:21:40.841810 env[1191]: time="2024-12-13T15:21:40.840727798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-k4pvk,Uid:efdc3177-eaa3-4e0c-afc0-67a85ecb2c20,Namespace:kube-system,Attempt:0,}" Dec 13 15:21:40.842321 env[1191]: time="2024-12-13T15:21:40.841013576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d5bbcbf99-x7fg2,Uid:b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58,Namespace:calico-system,Attempt:0,}" Dec 13 15:21:40.852125 env[1191]: time="2024-12-13T15:21:40.852083689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-lwhwc,Uid:fd6e7687-a4ca-4889-bf8c-35b9181fe8d6,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:21:41.123172 env[1191]: time="2024-12-13T15:21:41.123005905Z" level=error msg="Failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.127160 env[1191]: time="2024-12-13T15:21:41.127111380Z" level=error msg="encountered an error cleaning up failed sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.127406 env[1191]: time="2024-12-13T15:21:41.127357796Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d5bbcbf99-x7fg2,Uid:b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.129327 kubelet[2067]: E1213 15:21:41.128521 2067 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.129327 kubelet[2067]: E1213 15:21:41.128666 2067 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" Dec 13 15:21:41.129327 kubelet[2067]: E1213 15:21:41.128708 2067 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" Dec 13 15:21:41.129643 kubelet[2067]: E1213 15:21:41.128809 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5d5bbcbf99-x7fg2_calico-system(b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5d5bbcbf99-x7fg2_calico-system(b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" podUID="b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58" Dec 13 15:21:41.158797 env[1191]: time="2024-12-13T15:21:41.158717984Z" level=error msg="Failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.162523 env[1191]: time="2024-12-13T15:21:41.162473128Z" level=error msg="encountered an error cleaning up failed sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.162769 env[1191]: time="2024-12-13T15:21:41.162708610Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-llk82,Uid:2bb0905e-c268-4464-a7d2-c59f58942d08,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.164032 kubelet[2067]: E1213 15:21:41.163290 2067 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.164032 kubelet[2067]: E1213 15:21:41.163412 2067 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" Dec 13 15:21:41.164032 kubelet[2067]: E1213 15:21:41.163447 2067 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" Dec 13 15:21:41.164299 kubelet[2067]: E1213 15:21:41.163575 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-998f79f5-llk82_calico-apiserver(2bb0905e-c268-4464-a7d2-c59f58942d08)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-998f79f5-llk82_calico-apiserver(2bb0905e-c268-4464-a7d2-c59f58942d08)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" podUID="2bb0905e-c268-4464-a7d2-c59f58942d08" Dec 13 15:21:41.204032 env[1191]: time="2024-12-13T15:21:41.203931410Z" level=error msg="Failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.207837 env[1191]: time="2024-12-13T15:21:41.207787046Z" level=error msg="encountered an error cleaning up failed sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.208086 env[1191]: time="2024-12-13T15:21:41.208014517Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-lwhwc,Uid:fd6e7687-a4ca-4889-bf8c-35b9181fe8d6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.211423 kubelet[2067]: E1213 15:21:41.208575 2067 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.211423 kubelet[2067]: E1213 15:21:41.208670 2067 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" Dec 13 15:21:41.211423 kubelet[2067]: E1213 15:21:41.208706 2067 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" Dec 13 15:21:41.211799 kubelet[2067]: E1213 15:21:41.208796 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-998f79f5-lwhwc_calico-apiserver(fd6e7687-a4ca-4889-bf8c-35b9181fe8d6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-998f79f5-lwhwc_calico-apiserver(fd6e7687-a4ca-4889-bf8c-35b9181fe8d6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" podUID="fd6e7687-a4ca-4889-bf8c-35b9181fe8d6" Dec 13 15:21:41.217972 env[1191]: time="2024-12-13T15:21:41.217883629Z" level=error msg="Failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.220282 env[1191]: time="2024-12-13T15:21:41.218398285Z" level=error msg="Failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.220282 env[1191]: time="2024-12-13T15:21:41.219347353Z" level=error msg="encountered an error cleaning up failed sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.220282 env[1191]: time="2024-12-13T15:21:41.219434458Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-k4pvk,Uid:efdc3177-eaa3-4e0c-afc0-67a85ecb2c20,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.220282 env[1191]: time="2024-12-13T15:21:41.219733340Z" level=error msg="encountered an error cleaning up failed sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.220282 env[1191]: time="2024-12-13T15:21:41.219910700Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5x5kh,Uid:426bdb98-dfef-400a-ae3c-4abfc89d28e3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.221900 kubelet[2067]: E1213 15:21:41.221834 2067 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.222042 kubelet[2067]: E1213 15:21:41.221937 2067 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5x5kh" Dec 13 15:21:41.222042 kubelet[2067]: E1213 15:21:41.221968 2067 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5x5kh" Dec 13 15:21:41.222384 kubelet[2067]: E1213 15:21:41.222043 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-5x5kh_kube-system(426bdb98-dfef-400a-ae3c-4abfc89d28e3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-5x5kh_kube-system(426bdb98-dfef-400a-ae3c-4abfc89d28e3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5x5kh" podUID="426bdb98-dfef-400a-ae3c-4abfc89d28e3" Dec 13 15:21:41.223144 kubelet[2067]: E1213 15:21:41.222472 2067 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.223144 kubelet[2067]: E1213 15:21:41.222533 2067 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-k4pvk" Dec 13 15:21:41.223144 kubelet[2067]: E1213 15:21:41.222559 2067 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-k4pvk" Dec 13 15:21:41.224267 kubelet[2067]: E1213 15:21:41.222626 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-k4pvk_kube-system(efdc3177-eaa3-4e0c-afc0-67a85ecb2c20)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-k4pvk_kube-system(efdc3177-eaa3-4e0c-afc0-67a85ecb2c20)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-k4pvk" podUID="efdc3177-eaa3-4e0c-afc0-67a85ecb2c20" Dec 13 15:21:41.500150 systemd[1]: Created slice kubepods-besteffort-pod68399294_9c0a_4ef3_b240_417363b4cedc.slice. Dec 13 15:21:41.503992 env[1191]: time="2024-12-13T15:21:41.503930595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ntbs2,Uid:68399294-9c0a-4ef3-b240-417363b4cedc,Namespace:calico-system,Attempt:0,}" Dec 13 15:21:41.593551 env[1191]: time="2024-12-13T15:21:41.593463326Z" level=error msg="Failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.596628 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a-shm.mount: Deactivated successfully. Dec 13 15:21:41.597754 env[1191]: time="2024-12-13T15:21:41.597383722Z" level=error msg="encountered an error cleaning up failed sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.597986 env[1191]: time="2024-12-13T15:21:41.597928763Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ntbs2,Uid:68399294-9c0a-4ef3-b240-417363b4cedc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.598898 kubelet[2067]: E1213 15:21:41.598363 2067 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.598898 kubelet[2067]: E1213 15:21:41.598437 2067 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:41.598898 kubelet[2067]: E1213 15:21:41.598473 2067 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ntbs2" Dec 13 15:21:41.599564 kubelet[2067]: E1213 15:21:41.598530 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ntbs2_calico-system(68399294-9c0a-4ef3-b240-417363b4cedc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ntbs2_calico-system(68399294-9c0a-4ef3-b240-417363b4cedc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:41.706000 kubelet[2067]: I1213 15:21:41.705679 2067 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:21:41.707985 env[1191]: time="2024-12-13T15:21:41.707925954Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:21:41.709913 kubelet[2067]: I1213 15:21:41.709614 2067 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:21:41.710559 env[1191]: time="2024-12-13T15:21:41.710524391Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:21:41.715343 kubelet[2067]: I1213 15:21:41.715304 2067 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:21:41.716131 env[1191]: time="2024-12-13T15:21:41.716067706Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:21:41.717046 kubelet[2067]: I1213 15:21:41.717017 2067 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:21:41.717691 env[1191]: time="2024-12-13T15:21:41.717656289Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:21:41.719322 kubelet[2067]: I1213 15:21:41.719291 2067 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:21:41.720179 env[1191]: time="2024-12-13T15:21:41.720143600Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:21:41.722156 kubelet[2067]: I1213 15:21:41.722126 2067 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:21:41.722780 env[1191]: time="2024-12-13T15:21:41.722742312Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:21:41.843517 env[1191]: time="2024-12-13T15:21:41.842501224Z" level=error msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" failed" error="failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.844319 kubelet[2067]: E1213 15:21:41.844013 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:21:41.844319 kubelet[2067]: E1213 15:21:41.844092 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a"} Dec 13 15:21:41.844319 kubelet[2067]: E1213 15:21:41.844195 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:41.844319 kubelet[2067]: E1213 15:21:41.844255 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:41.852079 env[1191]: time="2024-12-13T15:21:41.852009098Z" level=error msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" failed" error="failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.852905 kubelet[2067]: E1213 15:21:41.852545 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:21:41.852905 kubelet[2067]: E1213 15:21:41.852684 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362"} Dec 13 15:21:41.852905 kubelet[2067]: E1213 15:21:41.852795 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:41.852905 kubelet[2067]: E1213 15:21:41.852830 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" podUID="2bb0905e-c268-4464-a7d2-c59f58942d08" Dec 13 15:21:41.880133 env[1191]: time="2024-12-13T15:21:41.880042769Z" level=error msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" failed" error="failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.881124 kubelet[2067]: E1213 15:21:41.880746 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:21:41.881124 kubelet[2067]: E1213 15:21:41.880859 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68"} Dec 13 15:21:41.881124 kubelet[2067]: E1213 15:21:41.880975 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:41.881124 kubelet[2067]: E1213 15:21:41.881029 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" podUID="b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58" Dec 13 15:21:41.888121 env[1191]: time="2024-12-13T15:21:41.888029856Z" level=error msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" failed" error="failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.888838 kubelet[2067]: E1213 15:21:41.888781 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:21:41.888965 kubelet[2067]: E1213 15:21:41.888857 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5"} Dec 13 15:21:41.888965 kubelet[2067]: E1213 15:21:41.888922 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:41.889128 kubelet[2067]: E1213 15:21:41.888956 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-k4pvk" podUID="efdc3177-eaa3-4e0c-afc0-67a85ecb2c20" Dec 13 15:21:41.890172 env[1191]: time="2024-12-13T15:21:41.890102987Z" level=error msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" failed" error="failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.890658 kubelet[2067]: E1213 15:21:41.890439 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:21:41.890658 kubelet[2067]: E1213 15:21:41.890507 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0"} Dec 13 15:21:41.890658 kubelet[2067]: E1213 15:21:41.890556 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:41.890658 kubelet[2067]: E1213 15:21:41.890608 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" podUID="fd6e7687-a4ca-4889-bf8c-35b9181fe8d6" Dec 13 15:21:41.902898 env[1191]: time="2024-12-13T15:21:41.902813926Z" level=error msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" failed" error="failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:41.903891 kubelet[2067]: E1213 15:21:41.903836 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:21:41.904020 kubelet[2067]: E1213 15:21:41.903901 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2"} Dec 13 15:21:41.904020 kubelet[2067]: E1213 15:21:41.903948 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:41.904020 kubelet[2067]: E1213 15:21:41.904006 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5x5kh" podUID="426bdb98-dfef-400a-ae3c-4abfc89d28e3" Dec 13 15:21:53.493673 env[1191]: time="2024-12-13T15:21:53.493507499Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:21:53.599191 env[1191]: time="2024-12-13T15:21:53.599091665Z" level=error msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" failed" error="failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:53.604265 kubelet[2067]: E1213 15:21:53.603702 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:21:53.604265 kubelet[2067]: E1213 15:21:53.603908 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2"} Dec 13 15:21:53.604265 kubelet[2067]: E1213 15:21:53.604064 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:53.604265 kubelet[2067]: E1213 15:21:53.604148 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5x5kh" podUID="426bdb98-dfef-400a-ae3c-4abfc89d28e3" Dec 13 15:21:54.233000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:54.239233 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 15:21:54.239409 kernel: audit: type=1400 audit(1734103314.233:969): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:54.233000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:54.259360 kernel: audit: type=1400 audit(1734103314.233:968): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:54.259497 kernel: audit: type=1300 audit(1734103314.233:969): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002578520 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:54.233000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002578520 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:54.283501 kernel: audit: type=1300 audit(1734103314.233:968): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0034882a0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:54.283626 kernel: audit: type=1327 audit(1734103314.233:968): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:54.283695 kernel: audit: type=1327 audit(1734103314.233:969): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:54.233000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0034882a0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:21:54.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:54.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:21:54.284153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2795848016.mount: Deactivated successfully. Dec 13 15:21:54.344462 env[1191]: time="2024-12-13T15:21:54.344372376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:54.346801 env[1191]: time="2024-12-13T15:21:54.346750414Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:54.348850 env[1191]: time="2024-12-13T15:21:54.348817863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:54.351563 env[1191]: time="2024-12-13T15:21:54.351525984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:21:54.351904 env[1191]: time="2024-12-13T15:21:54.351857279Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:21:54.391352 env[1191]: time="2024-12-13T15:21:54.391293191Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:21:54.415472 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2008552627.mount: Deactivated successfully. Dec 13 15:21:54.417609 env[1191]: time="2024-12-13T15:21:54.417548267Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927\"" Dec 13 15:21:54.420494 env[1191]: time="2024-12-13T15:21:54.419847241Z" level=info msg="StartContainer for \"ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927\"" Dec 13 15:21:54.454492 systemd[1]: Started cri-containerd-ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927.scope. Dec 13 15:21:54.500364 env[1191]: time="2024-12-13T15:21:54.496060427Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:21:54.519000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.519000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f2094b69ba8 items=0 ppid=2509 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:54.533846 kernel: audit: type=1400 audit(1734103314.519:970): avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533986 kernel: audit: type=1300 audit(1734103314.519:970): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f2094b69ba8 items=0 ppid=2509 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:54.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666633837633335626661643535626265343661653563336264623561 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.549639 kernel: audit: type=1327 audit(1734103314.519:970): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666633837633335626661643535626265343661653563336264623561 Dec 13 15:21:54.550066 kernel: audit: type=1400 audit(1734103314.533:971): avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit: BPF prog-id=142 op=LOAD Dec 13 15:21:54.533000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00028e618 items=0 ppid=2509 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:54.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666633837633335626661643535626265343661653563336264623561 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit: BPF prog-id=143 op=LOAD Dec 13 15:21:54.533000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028e668 items=0 ppid=2509 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:54.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666633837633335626661643535626265343661653563336264623561 Dec 13 15:21:54.533000 audit: BPF prog-id=143 op=UNLOAD Dec 13 15:21:54.533000 audit: BPF prog-id=142 op=UNLOAD Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:54.533000 audit: BPF prog-id=144 op=LOAD Dec 13 15:21:54.533000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00028e6f8 items=0 ppid=2509 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:54.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666633837633335626661643535626265343661653563336264623561 Dec 13 15:21:54.585473 env[1191]: time="2024-12-13T15:21:54.585416661Z" level=info msg="StartContainer for \"ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927\" returns successfully" Dec 13 15:21:54.601788 env[1191]: time="2024-12-13T15:21:54.600672139Z" level=error msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" failed" error="failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:54.601990 kubelet[2067]: E1213 15:21:54.601518 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:21:54.601990 kubelet[2067]: E1213 15:21:54.601603 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a"} Dec 13 15:21:54.601990 kubelet[2067]: E1213 15:21:54.601678 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:54.601990 kubelet[2067]: E1213 15:21:54.601728 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:21:54.829025 kubelet[2067]: I1213 15:21:54.826418 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4wpgd" podStartSLOduration=1.5889209499999999 podStartE2EDuration="29.821932519s" podCreationTimestamp="2024-12-13 15:21:25 +0000 UTC" firstStartedPulling="2024-12-13 15:21:26.121050337 +0000 UTC m=+25.883806708" lastFinishedPulling="2024-12-13 15:21:54.354061891 +0000 UTC m=+54.116818277" observedRunningTime="2024-12-13 15:21:54.819061275 +0000 UTC m=+54.581817663" watchObservedRunningTime="2024-12-13 15:21:54.821932519 +0000 UTC m=+54.584688905" Dec 13 15:21:55.153104 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:21:55.153870 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:21:55.236652 systemd[1]: cri-containerd-ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927.scope: Deactivated successfully. Dec 13 15:21:55.241000 audit: BPF prog-id=144 op=UNLOAD Dec 13 15:21:55.283851 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927-rootfs.mount: Deactivated successfully. Dec 13 15:21:55.356745 systemd[1]: Started sshd@9-10.244.14.190:22-218.92.0.235:60054.service. Dec 13 15:21:55.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.14.190:22-218.92.0.235:60054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:21:55.411923 env[1191]: time="2024-12-13T15:21:55.411829373Z" level=info msg="shim disconnected" id=ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927 Dec 13 15:21:55.412530 env[1191]: time="2024-12-13T15:21:55.412493104Z" level=warning msg="cleaning up after shim disconnected" id=ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927 namespace=k8s.io Dec 13 15:21:55.412698 env[1191]: time="2024-12-13T15:21:55.412667807Z" level=info msg="cleaning up dead shim" Dec 13 15:21:55.433768 env[1191]: time="2024-12-13T15:21:55.433695406Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:21:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3180 runtime=io.containerd.runc.v2\n" Dec 13 15:21:55.494118 env[1191]: time="2024-12-13T15:21:55.492570393Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:21:55.494118 env[1191]: time="2024-12-13T15:21:55.493299712Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:21:55.494441 env[1191]: time="2024-12-13T15:21:55.493928677Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:21:55.555619 env[1191]: time="2024-12-13T15:21:55.555531636Z" level=error msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" failed" error="failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:55.556241 kubelet[2067]: E1213 15:21:55.555908 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:21:55.556241 kubelet[2067]: E1213 15:21:55.556058 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0"} Dec 13 15:21:55.556241 kubelet[2067]: E1213 15:21:55.556171 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:55.556535 kubelet[2067]: E1213 15:21:55.556245 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" podUID="fd6e7687-a4ca-4889-bf8c-35b9181fe8d6" Dec 13 15:21:55.573556 env[1191]: time="2024-12-13T15:21:55.573420395Z" level=error msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" failed" error="failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:55.573894 kubelet[2067]: E1213 15:21:55.573811 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:21:55.573990 kubelet[2067]: E1213 15:21:55.573927 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68"} Dec 13 15:21:55.574079 kubelet[2067]: E1213 15:21:55.573981 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:55.574203 kubelet[2067]: E1213 15:21:55.574051 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" podUID="b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58" Dec 13 15:21:55.583311 env[1191]: time="2024-12-13T15:21:55.583258076Z" level=error msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" failed" error="failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:55.583828 kubelet[2067]: E1213 15:21:55.583646 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:21:55.583828 kubelet[2067]: E1213 15:21:55.583697 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5"} Dec 13 15:21:55.583828 kubelet[2067]: E1213 15:21:55.583738 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:55.583828 kubelet[2067]: E1213 15:21:55.583784 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-k4pvk" podUID="efdc3177-eaa3-4e0c-afc0-67a85ecb2c20" Dec 13 15:21:55.816381 kubelet[2067]: I1213 15:21:55.815464 2067 scope.go:117] "RemoveContainer" containerID="ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927" Dec 13 15:21:55.820928 env[1191]: time="2024-12-13T15:21:55.820490527Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 15:21:55.839449 env[1191]: time="2024-12-13T15:21:55.839387672Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc\"" Dec 13 15:21:55.840648 env[1191]: time="2024-12-13T15:21:55.840601690Z" level=info msg="StartContainer for \"15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc\"" Dec 13 15:21:55.893459 systemd[1]: Started cri-containerd-15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc.scope. Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f72bda9c7c8 items=0 ppid=2509 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:55.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135663865656139653133306232383932626662363438303733663530 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.961000 audit: BPF prog-id=145 op=LOAD Dec 13 15:21:55.961000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032fd98 items=0 ppid=2509 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:55.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135663865656139653133306232383932626662363438303733663530 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.963000 audit: BPF prog-id=146 op=LOAD Dec 13 15:21:55.963000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032fde8 items=0 ppid=2509 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:55.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135663865656139653133306232383932626662363438303733663530 Dec 13 15:21:55.964000 audit: BPF prog-id=146 op=UNLOAD Dec 13 15:21:55.964000 audit: BPF prog-id=145 op=UNLOAD Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:21:55.965000 audit: BPF prog-id=147 op=LOAD Dec 13 15:21:55.965000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032fe78 items=0 ppid=2509 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:21:55.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135663865656139653133306232383932626662363438303733663530 Dec 13 15:21:55.996549 env[1191]: time="2024-12-13T15:21:55.996458545Z" level=info msg="StartContainer for \"15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc\" returns successfully" Dec 13 15:21:56.106000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:56.106000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0059deea0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:21:56.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:21:56.107000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:56.107000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c005f20520 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:21:56.107000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:21:56.108000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:56.108000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005a62270 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:21:56.108000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:21:56.121000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:56.121000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:56.121000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0059df650 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:21:56.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:21:56.121000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005f20640 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:21:56.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:21:56.127180 systemd[1]: cri-containerd-15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc.scope: Deactivated successfully. Dec 13 15:21:56.130000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:21:56.130000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0059df6b0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:21:56.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:21:56.131000 audit: BPF prog-id=147 op=UNLOAD Dec 13 15:21:56.169636 env[1191]: time="2024-12-13T15:21:56.169573888Z" level=info msg="shim disconnected" id=15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc Dec 13 15:21:56.169951 env[1191]: time="2024-12-13T15:21:56.169908310Z" level=warning msg="cleaning up after shim disconnected" id=15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc namespace=k8s.io Dec 13 15:21:56.170093 env[1191]: time="2024-12-13T15:21:56.170062656Z" level=info msg="cleaning up dead shim" Dec 13 15:21:56.184994 env[1191]: time="2024-12-13T15:21:56.184925923Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:21:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3311 runtime=io.containerd.runc.v2\n" Dec 13 15:21:56.278312 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc-rootfs.mount: Deactivated successfully. Dec 13 15:21:56.493305 env[1191]: time="2024-12-13T15:21:56.493198161Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:21:56.544265 env[1191]: time="2024-12-13T15:21:56.544166362Z" level=error msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" failed" error="failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:21:56.547391 kubelet[2067]: E1213 15:21:56.544929 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:21:56.547391 kubelet[2067]: E1213 15:21:56.545032 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362"} Dec 13 15:21:56.547391 kubelet[2067]: E1213 15:21:56.545125 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:21:56.547391 kubelet[2067]: E1213 15:21:56.547326 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" podUID="2bb0905e-c268-4464-a7d2-c59f58942d08" Dec 13 15:21:56.807817 kubelet[2067]: I1213 15:21:56.807676 2067 scope.go:117] "RemoveContainer" containerID="ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927" Dec 13 15:21:56.808461 kubelet[2067]: I1213 15:21:56.808425 2067 scope.go:117] "RemoveContainer" containerID="15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc" Dec 13 15:21:56.811174 kubelet[2067]: E1213 15:21:56.811126 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-4wpgd_calico-system(9e163c88-6f40-4c71-9a70-e72b9498bb1e)\"" pod="calico-system/calico-node-4wpgd" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" Dec 13 15:21:56.811898 env[1191]: time="2024-12-13T15:21:56.811839600Z" level=info msg="RemoveContainer for \"ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927\"" Dec 13 15:21:56.818964 env[1191]: time="2024-12-13T15:21:56.818898565Z" level=info msg="RemoveContainer for \"ffc87c35bfad55bbe46ae5c3bdb5a81f95f35fed1ed713e9509006dc78412927\" returns successfully" Dec 13 15:21:56.972519 sshd[3179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.235 user=root Dec 13 15:21:56.971000 audit[3179]: USER_AUTH pid=3179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:21:57.813763 kubelet[2067]: I1213 15:21:57.813695 2067 scope.go:117] "RemoveContainer" containerID="15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc" Dec 13 15:21:57.815623 kubelet[2067]: E1213 15:21:57.814350 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-4wpgd_calico-system(9e163c88-6f40-4c71-9a70-e72b9498bb1e)\"" pod="calico-system/calico-node-4wpgd" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" Dec 13 15:21:58.951809 sshd[3179]: Failed password for root from 218.92.0.235 port 60054 ssh2 Dec 13 15:22:01.385000 audit[3179]: USER_AUTH pid=3179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:01.388646 kernel: kauditd_printk_skb: 104 callbacks suppressed Dec 13 15:22:01.389341 kernel: audit: type=1100 audit(1734103321.385:992): pid=3179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:03.051762 sshd[3179]: Failed password for root from 218.92.0.235 port 60054 ssh2 Dec 13 15:22:03.426000 audit[3179]: USER_AUTH pid=3179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:03.434273 kernel: audit: type=1100 audit(1734103323.426:993): pid=3179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:06.033306 sshd[3179]: Failed password for root from 218.92.0.235 port 60054 ssh2 Dec 13 15:22:06.497406 env[1191]: time="2024-12-13T15:22:06.495469349Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:22:06.553384 env[1191]: time="2024-12-13T15:22:06.553188883Z" level=error msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" failed" error="failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:06.554242 kubelet[2067]: E1213 15:22:06.554101 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:22:06.555556 kubelet[2067]: E1213 15:22:06.554747 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5"} Dec 13 15:22:06.555556 kubelet[2067]: E1213 15:22:06.554838 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:06.555556 kubelet[2067]: E1213 15:22:06.554915 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-k4pvk" podUID="efdc3177-eaa3-4e0c-afc0-67a85ecb2c20" Dec 13 15:22:08.493096 env[1191]: time="2024-12-13T15:22:08.491250842Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:22:08.537650 env[1191]: time="2024-12-13T15:22:08.537558542Z" level=error msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" failed" error="failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:08.538344 kubelet[2067]: E1213 15:22:08.538264 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:22:08.538791 kubelet[2067]: E1213 15:22:08.538368 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2"} Dec 13 15:22:08.538791 kubelet[2067]: E1213 15:22:08.538524 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:08.538791 kubelet[2067]: E1213 15:22:08.538575 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5x5kh" podUID="426bdb98-dfef-400a-ae3c-4abfc89d28e3" Dec 13 15:22:09.491477 env[1191]: time="2024-12-13T15:22:09.491410780Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:22:09.492579 env[1191]: time="2024-12-13T15:22:09.491875093Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:22:09.492956 env[1191]: time="2024-12-13T15:22:09.491948590Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:22:09.559190 env[1191]: time="2024-12-13T15:22:09.559109783Z" level=error msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" failed" error="failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:09.560571 kubelet[2067]: E1213 15:22:09.560329 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:22:09.560571 kubelet[2067]: E1213 15:22:09.560418 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a"} Dec 13 15:22:09.560571 kubelet[2067]: E1213 15:22:09.560478 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:09.560571 kubelet[2067]: E1213 15:22:09.560519 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:22:09.576549 env[1191]: time="2024-12-13T15:22:09.576441539Z" level=error msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" failed" error="failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:09.577168 kubelet[2067]: E1213 15:22:09.576922 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:22:09.577168 kubelet[2067]: E1213 15:22:09.577004 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0"} Dec 13 15:22:09.577168 kubelet[2067]: E1213 15:22:09.577070 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:09.577168 kubelet[2067]: E1213 15:22:09.577116 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" podUID="fd6e7687-a4ca-4889-bf8c-35b9181fe8d6" Dec 13 15:22:09.584679 env[1191]: time="2024-12-13T15:22:09.584539149Z" level=error msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" failed" error="failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:09.585211 kubelet[2067]: E1213 15:22:09.585027 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:22:09.585211 kubelet[2067]: E1213 15:22:09.585096 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68"} Dec 13 15:22:09.585211 kubelet[2067]: E1213 15:22:09.585139 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:09.585211 kubelet[2067]: E1213 15:22:09.585169 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" podUID="b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58" Dec 13 15:22:09.767000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.775273 kernel: audit: type=1400 audit(1734103329.767:994): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.767000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a05a0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.767000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:09.792514 kernel: audit: type=1300 audit(1734103329.767:994): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a05a0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.792806 kernel: audit: type=1327 audit(1734103329.767:994): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:09.792874 kernel: audit: type=1400 audit(1734103329.769:995): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.769000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.769000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a05c0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.820617 kernel: audit: type=1300 audit(1734103329.769:995): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a05c0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.820813 kernel: audit: type=1327 audit(1734103329.769:995): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:09.769000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:09.777000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.833395 kernel: audit: type=1400 audit(1734103329.777:996): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.777000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a0760 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.845248 kernel: audit: type=1300 audit(1734103329.777:996): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025a0760 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.845436 kernel: audit: type=1327 audit(1734103329.777:996): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:09.777000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:09.777000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.858152 kernel: audit: type=1400 audit(1734103329.777:997): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:09.777000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002579f60 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:09.777000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:10.492120 env[1191]: time="2024-12-13T15:22:10.492046817Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:22:10.492688 kubelet[2067]: I1213 15:22:10.492648 2067 scope.go:117] "RemoveContainer" containerID="15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc" Dec 13 15:22:10.497793 env[1191]: time="2024-12-13T15:22:10.497746322Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 15:22:10.518314 env[1191]: time="2024-12-13T15:22:10.516754204Z" level=info msg="CreateContainer within sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\"" Dec 13 15:22:10.520892 env[1191]: time="2024-12-13T15:22:10.520845116Z" level=info msg="StartContainer for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\"" Dec 13 15:22:10.570698 env[1191]: time="2024-12-13T15:22:10.570620166Z" level=error msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" failed" error="failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:10.582163 systemd[1]: run-containerd-runc-k8s.io-9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f-runc.P0YBDB.mount: Deactivated successfully. Dec 13 15:22:10.589004 kubelet[2067]: E1213 15:22:10.588596 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:22:10.589004 kubelet[2067]: E1213 15:22:10.588686 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362"} Dec 13 15:22:10.589004 kubelet[2067]: E1213 15:22:10.588769 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:10.589004 kubelet[2067]: E1213 15:22:10.588807 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" podUID="2bb0905e-c268-4464-a7d2-c59f58942d08" Dec 13 15:22:10.596875 systemd[1]: Started cri-containerd-9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f.scope. Dec 13 15:22:10.631000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.631000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f9ff5dfe3d8 items=0 ppid=2509 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:10.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666536346534333465333332326533343933356461343233373130 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.632000 audit: BPF prog-id=148 op=LOAD Dec 13 15:22:10.632000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001fc2f8 items=0 ppid=2509 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:10.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666536346534333465333332326533343933356461343233373130 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.634000 audit: BPF prog-id=149 op=LOAD Dec 13 15:22:10.634000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001fc348 items=0 ppid=2509 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:10.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666536346534333465333332326533343933356461343233373130 Dec 13 15:22:10.635000 audit: BPF prog-id=149 op=UNLOAD Dec 13 15:22:10.635000 audit: BPF prog-id=148 op=UNLOAD Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:10.635000 audit: BPF prog-id=150 op=LOAD Dec 13 15:22:10.635000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001fc3d8 items=0 ppid=2509 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:10.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666536346534333465333332326533343933356461343233373130 Dec 13 15:22:10.655514 env[1191]: time="2024-12-13T15:22:10.655357740Z" level=info msg="StartContainer for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\" returns successfully" Dec 13 15:22:10.801879 systemd[1]: cri-containerd-9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f.scope: Deactivated successfully. Dec 13 15:22:10.807000 audit: BPF prog-id=150 op=UNLOAD Dec 13 15:22:10.844661 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f-rootfs.mount: Deactivated successfully. Dec 13 15:22:10.864255 env[1191]: time="2024-12-13T15:22:10.864127793Z" level=info msg="shim disconnected" id=9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f Dec 13 15:22:10.864724 env[1191]: time="2024-12-13T15:22:10.864679103Z" level=warning msg="cleaning up after shim disconnected" id=9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f namespace=k8s.io Dec 13 15:22:10.864885 env[1191]: time="2024-12-13T15:22:10.864856202Z" level=info msg="cleaning up dead shim" Dec 13 15:22:10.865539 env[1191]: time="2024-12-13T15:22:10.865420148Z" level=error msg="ExecSync for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: not found" Dec 13 15:22:10.866165 kubelet[2067]: E1213 15:22:10.865908 2067 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: not found" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 15:22:10.868076 env[1191]: time="2024-12-13T15:22:10.868008602Z" level=error msg="ExecSync for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f not found: not found" Dec 13 15:22:10.868605 kubelet[2067]: E1213 15:22:10.868442 2067 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f not found: not found" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 15:22:10.870168 env[1191]: time="2024-12-13T15:22:10.870121425Z" level=error msg="ExecSync for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f not found: not found" Dec 13 15:22:10.870714 kubelet[2067]: E1213 15:22:10.870452 2067 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f not found: not found" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 15:22:10.888606 env[1191]: time="2024-12-13T15:22:10.888542547Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:22:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3514 runtime=io.containerd.runc.v2\n" Dec 13 15:22:11.370461 sshd[3179]: Received disconnect from 218.92.0.235 port 60054:11: [preauth] Dec 13 15:22:11.370461 sshd[3179]: Disconnected from authenticating user root 218.92.0.235 port 60054 [preauth] Dec 13 15:22:11.371331 sshd[3179]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.235 user=root Dec 13 15:22:11.373162 systemd[1]: sshd@9-10.244.14.190:22-218.92.0.235:60054.service: Deactivated successfully. Dec 13 15:22:11.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.14.190:22-218.92.0.235:60054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:11.857646 kubelet[2067]: I1213 15:22:11.857588 2067 scope.go:117] "RemoveContainer" containerID="15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc" Dec 13 15:22:11.858723 kubelet[2067]: I1213 15:22:11.858696 2067 scope.go:117] "RemoveContainer" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" Dec 13 15:22:11.859267 env[1191]: time="2024-12-13T15:22:11.859201147Z" level=info msg="RemoveContainer for \"15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc\"" Dec 13 15:22:11.859959 kubelet[2067]: E1213 15:22:11.859924 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-4wpgd_calico-system(9e163c88-6f40-4c71-9a70-e72b9498bb1e)\"" pod="calico-system/calico-node-4wpgd" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" Dec 13 15:22:11.867828 env[1191]: time="2024-12-13T15:22:11.867784404Z" level=info msg="RemoveContainer for \"15f8eea9e130b2892bfb648073f50e214427b7a6187e2d73bec691ba09ddfacc\" returns successfully" Dec 13 15:22:12.864936 kubelet[2067]: I1213 15:22:12.864769 2067 scope.go:117] "RemoveContainer" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" Dec 13 15:22:12.866669 kubelet[2067]: E1213 15:22:12.866600 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-4wpgd_calico-system(9e163c88-6f40-4c71-9a70-e72b9498bb1e)\"" pod="calico-system/calico-node-4wpgd" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" Dec 13 15:22:14.648606 systemd[1]: Started sshd@10-10.244.14.190:22-218.92.0.235:22750.service. Dec 13 15:22:14.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.14.190:22-218.92.0.235:22750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:16.100788 kubelet[2067]: I1213 15:22:16.100721 2067 scope.go:117] "RemoveContainer" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" Dec 13 15:22:16.101464 kubelet[2067]: E1213 15:22:16.101413 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-4wpgd_calico-system(9e163c88-6f40-4c71-9a70-e72b9498bb1e)\"" pod="calico-system/calico-node-4wpgd" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" Dec 13 15:22:18.872404 sshd[3529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.235 user=root Dec 13 15:22:18.871000 audit[3529]: USER_AUTH pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:18.874214 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 15:22:18.874337 kernel: audit: type=1100 audit(1734103338.871:1007): pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:20.208618 sshd[3529]: Failed password for root from 218.92.0.235 port 22750 ssh2 Dec 13 15:22:20.493291 env[1191]: time="2024-12-13T15:22:20.493155614Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:22:20.552360 env[1191]: time="2024-12-13T15:22:20.552269187Z" level=error msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" failed" error="failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:20.553272 kubelet[2067]: E1213 15:22:20.552974 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:22:20.553272 kubelet[2067]: E1213 15:22:20.553072 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5"} Dec 13 15:22:20.553272 kubelet[2067]: E1213 15:22:20.553128 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:20.553272 kubelet[2067]: E1213 15:22:20.553164 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-k4pvk" podUID="efdc3177-eaa3-4e0c-afc0-67a85ecb2c20" Dec 13 15:22:21.464000 audit[3529]: ANOM_LOGIN_FAILURES pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:21.466167 sshd[3529]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Dec 13 15:22:21.474152 kernel: audit: type=2100 audit(1734103341.464:1008): pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:21.477352 kernel: audit: type=1100 audit(1734103341.465:1009): pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:21.465000 audit[3529]: USER_AUTH pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:22.495188 env[1191]: time="2024-12-13T15:22:22.495107595Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:22:22.500210 env[1191]: time="2024-12-13T15:22:22.499447813Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:22:22.500210 env[1191]: time="2024-12-13T15:22:22.499899158Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:22:22.575176 env[1191]: time="2024-12-13T15:22:22.575081324Z" level=error msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" failed" error="failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:22.576335 kubelet[2067]: E1213 15:22:22.575855 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:22:22.576335 kubelet[2067]: E1213 15:22:22.576016 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68"} Dec 13 15:22:22.576335 kubelet[2067]: E1213 15:22:22.576143 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:22.576335 kubelet[2067]: E1213 15:22:22.576252 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" podUID="b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58" Dec 13 15:22:22.594408 env[1191]: time="2024-12-13T15:22:22.594323772Z" level=error msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" failed" error="failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:22.595319 kubelet[2067]: E1213 15:22:22.594930 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:22:22.595319 kubelet[2067]: E1213 15:22:22.595035 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0"} Dec 13 15:22:22.595319 kubelet[2067]: E1213 15:22:22.595126 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:22.595319 kubelet[2067]: E1213 15:22:22.595213 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" podUID="fd6e7687-a4ca-4889-bf8c-35b9181fe8d6" Dec 13 15:22:22.596716 env[1191]: time="2024-12-13T15:22:22.596665626Z" level=error msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" failed" error="failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:22.597280 kubelet[2067]: E1213 15:22:22.596988 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:22:22.597280 kubelet[2067]: E1213 15:22:22.597096 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2"} Dec 13 15:22:22.597280 kubelet[2067]: E1213 15:22:22.597134 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:22.597280 kubelet[2067]: E1213 15:22:22.597190 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"426bdb98-dfef-400a-ae3c-4abfc89d28e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5x5kh" podUID="426bdb98-dfef-400a-ae3c-4abfc89d28e3" Dec 13 15:22:23.210375 sshd[3529]: Failed password for root from 218.92.0.235 port 22750 ssh2 Dec 13 15:22:23.491331 env[1191]: time="2024-12-13T15:22:23.491268041Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:22:23.491721 env[1191]: time="2024-12-13T15:22:23.491291506Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:22:23.535416 env[1191]: time="2024-12-13T15:22:23.535306627Z" level=error msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" failed" error="failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:23.535968 kubelet[2067]: E1213 15:22:23.535677 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:22:23.535968 kubelet[2067]: E1213 15:22:23.535782 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362"} Dec 13 15:22:23.535968 kubelet[2067]: E1213 15:22:23.535835 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:23.535968 kubelet[2067]: E1213 15:22:23.535890 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2bb0905e-c268-4464-a7d2-c59f58942d08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" podUID="2bb0905e-c268-4464-a7d2-c59f58942d08" Dec 13 15:22:23.544554 env[1191]: time="2024-12-13T15:22:23.544488017Z" level=error msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" failed" error="failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:22:23.544855 kubelet[2067]: E1213 15:22:23.544769 2067 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:22:23.544957 kubelet[2067]: E1213 15:22:23.544849 2067 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a"} Dec 13 15:22:23.545087 kubelet[2067]: E1213 15:22:23.545035 2067 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:22:23.545245 kubelet[2067]: E1213 15:22:23.545121 2067 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68399294-9c0a-4ef3-b240-417363b4cedc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ntbs2" podUID="68399294-9c0a-4ef3-b240-417363b4cedc" Dec 13 15:22:23.999000 audit[3529]: USER_AUTH pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:24.007269 kernel: audit: type=1100 audit(1734103343.999:1010): pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:26.066915 env[1191]: time="2024-12-13T15:22:26.066842796Z" level=info msg="StopPodSandbox for \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\"" Dec 13 15:22:26.067772 env[1191]: time="2024-12-13T15:22:26.067733127Z" level=info msg="Container to stop \"0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 15:22:26.067945 env[1191]: time="2024-12-13T15:22:26.067911095Z" level=info msg="Container to stop \"e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 15:22:26.068118 env[1191]: time="2024-12-13T15:22:26.068084227Z" level=info msg="Container to stop \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 15:22:26.073142 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f-shm.mount: Deactivated successfully. Dec 13 15:22:26.096000 audit: BPF prog-id=128 op=UNLOAD Dec 13 15:22:26.097388 systemd[1]: cri-containerd-1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f.scope: Deactivated successfully. Dec 13 15:22:26.104307 kernel: audit: type=1334 audit(1734103346.096:1011): prog-id=128 op=UNLOAD Dec 13 15:22:26.104000 audit: BPF prog-id=131 op=UNLOAD Dec 13 15:22:26.108267 kernel: audit: type=1334 audit(1734103346.104:1012): prog-id=131 op=UNLOAD Dec 13 15:22:26.146655 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f-rootfs.mount: Deactivated successfully. Dec 13 15:22:26.162013 env[1191]: time="2024-12-13T15:22:26.161922321Z" level=info msg="shim disconnected" id=1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f Dec 13 15:22:26.163515 env[1191]: time="2024-12-13T15:22:26.163477611Z" level=warning msg="cleaning up after shim disconnected" id=1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f namespace=k8s.io Dec 13 15:22:26.163668 env[1191]: time="2024-12-13T15:22:26.163636301Z" level=info msg="cleaning up dead shim" Dec 13 15:22:26.192067 env[1191]: time="2024-12-13T15:22:26.191916091Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:22:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3675 runtime=io.containerd.runc.v2\ntime=\"2024-12-13T15:22:26Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Dec 13 15:22:26.193041 env[1191]: time="2024-12-13T15:22:26.192988075Z" level=info msg="TearDown network for sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" successfully" Dec 13 15:22:26.193141 env[1191]: time="2024-12-13T15:22:26.193039909Z" level=info msg="StopPodSandbox for \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" returns successfully" Dec 13 15:22:26.242646 kubelet[2067]: I1213 15:22:26.242398 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-lib-calico\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.242646 kubelet[2067]: I1213 15:22:26.242456 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-net-dir\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.242646 kubelet[2067]: I1213 15:22:26.242506 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-lib-modules\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.242646 kubelet[2067]: I1213 15:22:26.242560 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-run-calico\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.242646 kubelet[2067]: I1213 15:22:26.242595 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-bin-dir\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.242646 kubelet[2067]: I1213 15:22:26.242661 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-log-dir\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.243709 kubelet[2067]: I1213 15:22:26.242698 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mpvbt\" (UniqueName: \"kubernetes.io/projected/9e163c88-6f40-4c71-9a70-e72b9498bb1e-kube-api-access-mpvbt\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.243709 kubelet[2067]: I1213 15:22:26.242750 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-xtables-lock\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.243709 kubelet[2067]: I1213 15:22:26.242820 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9e163c88-6f40-4c71-9a70-e72b9498bb1e-tigera-ca-bundle\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.243709 kubelet[2067]: I1213 15:22:26.242849 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-policysync\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.243709 kubelet[2067]: I1213 15:22:26.242910 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9e163c88-6f40-4c71-9a70-e72b9498bb1e-node-certs\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.243709 kubelet[2067]: I1213 15:22:26.242945 2067 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-flexvol-driver-host\") pod \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\" (UID: \"9e163c88-6f40-4c71-9a70-e72b9498bb1e\") " Dec 13 15:22:26.246326 kubelet[2067]: I1213 15:22:26.243098 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.246326 kubelet[2067]: I1213 15:22:26.242565 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.246326 kubelet[2067]: I1213 15:22:26.245523 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.246326 kubelet[2067]: I1213 15:22:26.245577 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.246326 kubelet[2067]: I1213 15:22:26.245617 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.246715 kubelet[2067]: I1213 15:22:26.245651 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.246715 kubelet[2067]: I1213 15:22:26.245682 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.250885 kubelet[2067]: I1213 15:22:26.250835 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.250995 kubelet[2067]: I1213 15:22:26.250907 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-policysync" (OuterVolumeSpecName: "policysync") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 15:22:26.255960 systemd[1]: var-lib-kubelet-pods-9e163c88\x2d6f40\x2d4c71\x2d9a70\x2de72b9498bb1e-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmpvbt.mount: Deactivated successfully. Dec 13 15:22:26.259247 kubelet[2067]: I1213 15:22:26.258362 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/9e163c88-6f40-4c71-9a70-e72b9498bb1e-kube-api-access-mpvbt" (OuterVolumeSpecName: "kube-api-access-mpvbt") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "kube-api-access-mpvbt". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 15:22:26.262285 systemd[1]: var-lib-kubelet-pods-9e163c88\x2d6f40\x2d4c71\x2d9a70\x2de72b9498bb1e-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 15:22:26.265249 kubelet[2067]: I1213 15:22:26.264388 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/9e163c88-6f40-4c71-9a70-e72b9498bb1e-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 15:22:26.272685 systemd[1]: var-lib-kubelet-pods-9e163c88\x2d6f40\x2d4c71\x2d9a70\x2de72b9498bb1e-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 15:22:26.274141 kubelet[2067]: I1213 15:22:26.274080 2067 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/9e163c88-6f40-4c71-9a70-e72b9498bb1e-node-certs" (OuterVolumeSpecName: "node-certs") pod "9e163c88-6f40-4c71-9a70-e72b9498bb1e" (UID: "9e163c88-6f40-4c71-9a70-e72b9498bb1e"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 15:22:26.286530 kubelet[2067]: I1213 15:22:26.285592 2067 topology_manager.go:215] "Topology Admit Handler" podUID="34446398-bb1b-439a-9862-b410e1bc1ed9" podNamespace="calico-system" podName="calico-node-6tp6c" Dec 13 15:22:26.287573 kubelet[2067]: E1213 15:22:26.287524 2067 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="calico-node" Dec 13 15:22:26.287573 kubelet[2067]: E1213 15:22:26.287583 2067 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="calico-node" Dec 13 15:22:26.287773 kubelet[2067]: E1213 15:22:26.287599 2067 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="flexvol-driver" Dec 13 15:22:26.287773 kubelet[2067]: E1213 15:22:26.287629 2067 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="install-cni" Dec 13 15:22:26.287773 kubelet[2067]: I1213 15:22:26.287761 2067 memory_manager.go:354] "RemoveStaleState removing state" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="calico-node" Dec 13 15:22:26.287964 kubelet[2067]: I1213 15:22:26.287798 2067 memory_manager.go:354] "RemoveStaleState removing state" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="calico-node" Dec 13 15:22:26.287964 kubelet[2067]: I1213 15:22:26.287824 2067 memory_manager.go:354] "RemoveStaleState removing state" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="calico-node" Dec 13 15:22:26.287964 kubelet[2067]: E1213 15:22:26.287863 2067 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" containerName="calico-node" Dec 13 15:22:26.295703 systemd[1]: Created slice kubepods-besteffort-pod34446398_bb1b_439a_9862_b410e1bc1ed9.slice. Dec 13 15:22:26.346846 kubelet[2067]: I1213 15:22:26.346666 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-policysync\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.346846 kubelet[2067]: I1213 15:22:26.346737 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-xtables-lock\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.346846 kubelet[2067]: I1213 15:22:26.346772 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-var-run-calico\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.346846 kubelet[2067]: I1213 15:22:26.346812 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-flexvol-driver-host\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.346846 kubelet[2067]: I1213 15:22:26.346844 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-cni-net-dir\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347404 kubelet[2067]: I1213 15:22:26.346874 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-lib-modules\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347404 kubelet[2067]: I1213 15:22:26.346916 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/34446398-bb1b-439a-9862-b410e1bc1ed9-tigera-ca-bundle\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347404 kubelet[2067]: I1213 15:22:26.346944 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-cni-bin-dir\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347404 kubelet[2067]: I1213 15:22:26.346974 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-cni-log-dir\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347404 kubelet[2067]: I1213 15:22:26.347014 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/34446398-bb1b-439a-9862-b410e1bc1ed9-node-certs\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347056 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/34446398-bb1b-439a-9862-b410e1bc1ed9-var-lib-calico\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347103 2067 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7rj6\" (UniqueName: \"kubernetes.io/projected/34446398-bb1b-439a-9862-b410e1bc1ed9-kube-api-access-z7rj6\") pod \"calico-node-6tp6c\" (UID: \"34446398-bb1b-439a-9862-b410e1bc1ed9\") " pod="calico-system/calico-node-6tp6c" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347169 2067 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-lib-calico\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347189 2067 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-net-dir\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347206 2067 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-var-run-calico\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347243 2067 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-lib-modules\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.347868 kubelet[2067]: I1213 15:22:26.347261 2067 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-bin-dir\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347276 2067 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-cni-log-dir\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347295 2067 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-mpvbt\" (UniqueName: \"kubernetes.io/projected/9e163c88-6f40-4c71-9a70-e72b9498bb1e-kube-api-access-mpvbt\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347321 2067 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-xtables-lock\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347337 2067 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9e163c88-6f40-4c71-9a70-e72b9498bb1e-node-certs\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347358 2067 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-flexvol-driver-host\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347382 2067 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9e163c88-6f40-4c71-9a70-e72b9498bb1e-tigera-ca-bundle\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.348326 kubelet[2067]: I1213 15:22:26.347397 2067 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9e163c88-6f40-4c71-9a70-e72b9498bb1e-policysync\") on node \"srv-fauys.gb1.brightbox.com\" DevicePath \"\"" Dec 13 15:22:26.352626 sshd[3529]: Failed password for root from 218.92.0.235 port 22750 ssh2 Dec 13 15:22:26.500471 systemd[1]: Removed slice kubepods-besteffort-pod9e163c88_6f40_4c71_9a70_e72b9498bb1e.slice. Dec 13 15:22:26.500636 systemd[1]: kubepods-besteffort-pod9e163c88_6f40_4c71_9a70_e72b9498bb1e.slice: Consumed 1.340s CPU time. Dec 13 15:22:26.601479 env[1191]: time="2024-12-13T15:22:26.600083482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6tp6c,Uid:34446398-bb1b-439a-9862-b410e1bc1ed9,Namespace:calico-system,Attempt:0,}" Dec 13 15:22:26.619695 env[1191]: time="2024-12-13T15:22:26.619462423Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:26.619695 env[1191]: time="2024-12-13T15:22:26.619516035Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:26.619695 env[1191]: time="2024-12-13T15:22:26.619533722Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:26.620337 env[1191]: time="2024-12-13T15:22:26.620246307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d pid=3698 runtime=io.containerd.runc.v2 Dec 13 15:22:26.647738 systemd[1]: Started cri-containerd-e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d.scope. Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703394 kernel: audit: type=1400 audit(1734103346.692:1013): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703502 kernel: audit: type=1400 audit(1734103346.692:1014): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.711267 kernel: audit: type=1400 audit(1734103346.692:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.717253 kernel: audit: type=1400 audit(1734103346.692:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.723245 kernel: audit: type=1400 audit(1734103346.692:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.730287 kernel: audit: type=1400 audit(1734103346.692:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.738318 kernel: audit: type=1400 audit(1734103346.692:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.702000 audit: BPF prog-id=151 op=LOAD Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3698 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363535303962366661663833393361653631633035656264333266 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3698 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363535303962366661663833393361653631633035656264333266 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit: BPF prog-id=152 op=LOAD Dec 13 15:22:26.703000 audit[3708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304460 items=0 ppid=3698 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363535303962366661663833393361653631633035656264333266 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit: BPF prog-id=153 op=LOAD Dec 13 15:22:26.703000 audit[3708]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003044a8 items=0 ppid=3698 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363535303962366661663833393361653631633035656264333266 Dec 13 15:22:26.703000 audit: BPF prog-id=153 op=UNLOAD Dec 13 15:22:26.703000 audit: BPF prog-id=152 op=UNLOAD Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.703000 audit: BPF prog-id=154 op=LOAD Dec 13 15:22:26.703000 audit[3708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003048b8 items=0 ppid=3698 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363535303962366661663833393361653631633035656264333266 Dec 13 15:22:26.754402 env[1191]: time="2024-12-13T15:22:26.754319942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6tp6c,Uid:34446398-bb1b-439a-9862-b410e1bc1ed9,Namespace:calico-system,Attempt:0,} returns sandbox id \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\"" Dec 13 15:22:26.766907 env[1191]: time="2024-12-13T15:22:26.766853197Z" level=info msg="CreateContainer within sandbox \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:22:26.783864 env[1191]: time="2024-12-13T15:22:26.783793506Z" level=info msg="CreateContainer within sandbox \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819\"" Dec 13 15:22:26.786309 env[1191]: time="2024-12-13T15:22:26.786267446Z" level=info msg="StartContainer for \"41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819\"" Dec 13 15:22:26.812699 systemd[1]: Started cri-containerd-41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819.scope. Dec 13 15:22:26.860000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.860000 audit[3740]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f6f85953f08 items=0 ppid=3698 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623638333534323061643861313537646165366239633564616564 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit: BPF prog-id=155 op=LOAD Dec 13 15:22:26.861000 audit[3740]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0002e7c58 items=0 ppid=3698 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623638333534323061643861313537646165366239633564616564 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit: BPF prog-id=156 op=LOAD Dec 13 15:22:26.861000 audit[3740]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0002e7ca8 items=0 ppid=3698 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623638333534323061643861313537646165366239633564616564 Dec 13 15:22:26.861000 audit: BPF prog-id=156 op=UNLOAD Dec 13 15:22:26.861000 audit: BPF prog-id=155 op=UNLOAD Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { perfmon } for pid=3740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit[3740]: AVC avc: denied { bpf } for pid=3740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:26.861000 audit: BPF prog-id=157 op=LOAD Dec 13 15:22:26.861000 audit[3740]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0002e7d38 items=0 ppid=3698 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:26.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431623638333534323061643861313537646165366239633564616564 Dec 13 15:22:26.892678 env[1191]: time="2024-12-13T15:22:26.892610720Z" level=info msg="StartContainer for \"41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819\" returns successfully" Dec 13 15:22:26.908950 kubelet[2067]: I1213 15:22:26.908916 2067 scope.go:117] "RemoveContainer" containerID="9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f" Dec 13 15:22:26.914488 env[1191]: time="2024-12-13T15:22:26.914206256Z" level=info msg="RemoveContainer for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\"" Dec 13 15:22:26.923247 env[1191]: time="2024-12-13T15:22:26.921392082Z" level=info msg="RemoveContainer for \"9cfe64e434e3322e34935da4237102fb5018d02442c20e13f2a430a1b04d9d2f\" returns successfully" Dec 13 15:22:26.923376 kubelet[2067]: I1213 15:22:26.921642 2067 scope.go:117] "RemoveContainer" containerID="e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5" Dec 13 15:22:26.929650 env[1191]: time="2024-12-13T15:22:26.929597178Z" level=info msg="RemoveContainer for \"e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5\"" Dec 13 15:22:26.933930 env[1191]: time="2024-12-13T15:22:26.933870371Z" level=info msg="RemoveContainer for \"e4cf910810bd56dc9287da98a37979474ae447f741fd1d58a0461059ce7d4df5\" returns successfully" Dec 13 15:22:26.934344 kubelet[2067]: I1213 15:22:26.934299 2067 scope.go:117] "RemoveContainer" containerID="0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603" Dec 13 15:22:26.936525 env[1191]: time="2024-12-13T15:22:26.936491064Z" level=info msg="RemoveContainer for \"0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603\"" Dec 13 15:22:26.946610 env[1191]: time="2024-12-13T15:22:26.946552335Z" level=info msg="RemoveContainer for \"0544da7a58ac2f33bef56715dfa43c66dda633542b988c2462a16a438c85b603\" returns successfully" Dec 13 15:22:26.995525 systemd[1]: cri-containerd-41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819.scope: Deactivated successfully. Dec 13 15:22:26.997000 audit: BPF prog-id=157 op=UNLOAD Dec 13 15:22:27.033597 env[1191]: time="2024-12-13T15:22:27.033532049Z" level=info msg="shim disconnected" id=41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819 Dec 13 15:22:27.033597 env[1191]: time="2024-12-13T15:22:27.033596910Z" level=warning msg="cleaning up after shim disconnected" id=41b6835420ad8a157dae6b9c5daed237dcf195d54083224897ab6e52da4c0819 namespace=k8s.io Dec 13 15:22:27.033949 env[1191]: time="2024-12-13T15:22:27.033613493Z" level=info msg="cleaning up dead shim" Dec 13 15:22:27.046443 env[1191]: time="2024-12-13T15:22:27.046371703Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:22:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3778 runtime=io.containerd.runc.v2\n" Dec 13 15:22:27.916708 env[1191]: time="2024-12-13T15:22:27.916640622Z" level=info msg="CreateContainer within sandbox \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:22:27.938279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4228923863.mount: Deactivated successfully. Dec 13 15:22:27.948098 env[1191]: time="2024-12-13T15:22:27.948028392Z" level=info msg="CreateContainer within sandbox \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389\"" Dec 13 15:22:27.948804 env[1191]: time="2024-12-13T15:22:27.948769546Z" level=info msg="StartContainer for \"80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389\"" Dec 13 15:22:27.990487 systemd[1]: Started cri-containerd-80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389.scope. Dec 13 15:22:28.044000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.044000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f71420d7998 items=0 ppid=3698 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:28.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830666338373264396639363033303131393762626131303939383662 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.045000 audit: BPF prog-id=158 op=LOAD Dec 13 15:22:28.045000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e9fa8 items=0 ppid=3698 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:28.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830666338373264396639363033303131393762626131303939383662 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit: BPF prog-id=159 op=LOAD Dec 13 15:22:28.047000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e9ff8 items=0 ppid=3698 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:28.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830666338373264396639363033303131393762626131303939383662 Dec 13 15:22:28.047000 audit: BPF prog-id=159 op=UNLOAD Dec 13 15:22:28.047000 audit: BPF prog-id=158 op=UNLOAD Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:28.047000 audit: BPF prog-id=160 op=LOAD Dec 13 15:22:28.047000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b0088 items=0 ppid=3698 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:28.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830666338373264396639363033303131393762626131303939383662 Dec 13 15:22:28.074701 systemd[1]: run-containerd-runc-k8s.io-80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389-runc.fBxJDE.mount: Deactivated successfully. Dec 13 15:22:28.076630 env[1191]: time="2024-12-13T15:22:28.075823356Z" level=info msg="StartContainer for \"80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389\" returns successfully" Dec 13 15:22:28.495947 kubelet[2067]: I1213 15:22:28.495863 2067 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="9e163c88-6f40-4c71-9a70-e72b9498bb1e" path="/var/lib/kubelet/pods/9e163c88-6f40-4c71-9a70-e72b9498bb1e/volumes" Dec 13 15:22:28.637660 sshd[3529]: Received disconnect from 218.92.0.235 port 22750:11: [preauth] Dec 13 15:22:28.637660 sshd[3529]: Disconnected from authenticating user root 218.92.0.235 port 22750 [preauth] Dec 13 15:22:28.637144 sshd[3529]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.235 user=root Dec 13 15:22:28.640608 systemd[1]: sshd@10-10.244.14.190:22-218.92.0.235:22750.service: Deactivated successfully. Dec 13 15:22:28.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.14.190:22-218.92.0.235:22750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:28.972352 systemd[1]: Started sshd@11-10.244.14.190:22-218.92.0.235:22408.service. Dec 13 15:22:28.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.14.190:22-218.92.0.235:22408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:29.795844 systemd[1]: cri-containerd-80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389.scope: Deactivated successfully. Dec 13 15:22:29.796288 systemd[1]: cri-containerd-80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389.scope: Consumed 1.244s CPU time. Dec 13 15:22:29.800000 audit: BPF prog-id=160 op=UNLOAD Dec 13 15:22:29.804421 kernel: kauditd_printk_skb: 139 callbacks suppressed Dec 13 15:22:29.804617 kernel: audit: type=1334 audit(1734103349.800:1046): prog-id=160 op=UNLOAD Dec 13 15:22:29.832435 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389-rootfs.mount: Deactivated successfully. Dec 13 15:22:29.848124 env[1191]: time="2024-12-13T15:22:29.846171851Z" level=info msg="shim disconnected" id=80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389 Dec 13 15:22:29.848124 env[1191]: time="2024-12-13T15:22:29.846268326Z" level=warning msg="cleaning up after shim disconnected" id=80fc872d9f960301197bba109986b5cada4b8a3fe9687fd2527a259251006389 namespace=k8s.io Dec 13 15:22:29.848124 env[1191]: time="2024-12-13T15:22:29.846286881Z" level=info msg="cleaning up dead shim" Dec 13 15:22:29.861638 env[1191]: time="2024-12-13T15:22:29.861572021Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:22:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3848 runtime=io.containerd.runc.v2\n" Dec 13 15:22:29.951718 env[1191]: time="2024-12-13T15:22:29.951654216Z" level=info msg="CreateContainer within sandbox \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:22:29.975188 env[1191]: time="2024-12-13T15:22:29.975121488Z" level=info msg="CreateContainer within sandbox \"e865509b6faf8393ae61c05ebd32f04984903072f29cf5722d2c5ef66f42ab9d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39\"" Dec 13 15:22:29.975875 env[1191]: time="2024-12-13T15:22:29.975816594Z" level=info msg="StartContainer for \"919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39\"" Dec 13 15:22:30.008993 systemd[1]: Started cri-containerd-919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39.scope. Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059484 kernel: audit: type=1400 audit(1734103350.052:1047): avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f82fc44d358 items=0 ppid=3698 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:30.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396639623832376566336163633164306432316365343635356138 Dec 13 15:22:30.075876 kernel: audit: type=1300 audit(1734103350.052:1047): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f82fc44d358 items=0 ppid=3698 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:30.076028 kernel: audit: type=1327 audit(1734103350.052:1047): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396639623832376566336163633164306432316365343635356138 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.087248 kernel: audit: type=1400 audit(1734103350.052:1048): avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.094249 kernel: audit: type=1400 audit(1734103350.052:1048): avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.108959 kernel: audit: type=1400 audit(1734103350.052:1048): avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.109111 kernel: audit: type=1400 audit(1734103350.052:1048): avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.119885 kernel: audit: type=1400 audit(1734103350.052:1048): avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.120015 kernel: audit: type=1400 audit(1734103350.052:1048): avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.052000 audit: BPF prog-id=161 op=LOAD Dec 13 15:22:30.052000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003196e8 items=0 ppid=3698 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:30.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396639623832376566336163633164306432316365343635356138 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.058000 audit: BPF prog-id=162 op=LOAD Dec 13 15:22:30.058000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000319738 items=0 ppid=3698 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:30.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396639623832376566336163633164306432316365343635356138 Dec 13 15:22:30.059000 audit: BPF prog-id=162 op=UNLOAD Dec 13 15:22:30.059000 audit: BPF prog-id=161 op=UNLOAD Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:30.059000 audit: BPF prog-id=163 op=LOAD Dec 13 15:22:30.059000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003197c8 items=0 ppid=3698 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:30.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931396639623832376566336163633164306432316365343635356138 Dec 13 15:22:30.125165 env[1191]: time="2024-12-13T15:22:30.125112369Z" level=info msg="StartContainer for \"919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39\" returns successfully" Dec 13 15:22:30.955688 kubelet[2067]: I1213 15:22:30.955583 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6tp6c" podStartSLOduration=4.95553288 podStartE2EDuration="4.95553288s" podCreationTimestamp="2024-12-13 15:22:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:22:30.952625155 +0000 UTC m=+90.715381543" watchObservedRunningTime="2024-12-13 15:22:30.95553288 +0000 UTC m=+90.718289264" Dec 13 15:22:30.976665 systemd[1]: run-containerd-runc-k8s.io-919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39-runc.GE5hCe.mount: Deactivated successfully. Dec 13 15:22:31.821000 audit[3996]: AVC avc: denied { write } for pid=3996 comm="tee" name="fd" dev="proc" ino=32125 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.821000 audit[3996]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe772fea06 a2=241 a3=1b6 items=1 ppid=3952 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.821000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:22:31.821000 audit: PATH item=0 name="/dev/fd/63" inode=31147 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.828000 audit[3999]: AVC avc: denied { write } for pid=3999 comm="tee" name="fd" dev="proc" ino=31163 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.835000 audit[4001]: AVC avc: denied { write } for pid=4001 comm="tee" name="fd" dev="proc" ino=31169 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.843000 audit[4003]: AVC avc: denied { write } for pid=4003 comm="tee" name="fd" dev="proc" ino=32132 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.835000 audit[4001]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc46c379f6 a2=241 a3=1b6 items=1 ppid=3958 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.835000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:22:31.835000 audit: PATH item=0 name="/dev/fd/63" inode=31151 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.835000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.828000 audit[3999]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcceabca08 a2=241 a3=1b6 items=1 ppid=3953 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.828000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:22:31.828000 audit: PATH item=0 name="/dev/fd/63" inode=31148 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.828000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.849000 audit[4005]: AVC avc: denied { write } for pid=4005 comm="tee" name="fd" dev="proc" ino=31174 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.849000 audit[4005]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd05260a07 a2=241 a3=1b6 items=1 ppid=3957 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.849000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:22:31.849000 audit: PATH item=0 name="/dev/fd/63" inode=32127 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.849000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.843000 audit[4003]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe68781a06 a2=241 a3=1b6 items=1 ppid=3963 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.843000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:22:31.843000 audit: PATH item=0 name="/dev/fd/63" inode=31156 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.843000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.892000 audit[4018]: AVC avc: denied { write } for pid=4018 comm="tee" name="fd" dev="proc" ino=32142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.892000 audit[4018]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5e80fa06 a2=241 a3=1b6 items=1 ppid=3962 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.892000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:22:31.892000 audit: PATH item=0 name="/dev/fd/63" inode=32133 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.892000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.901000 audit[4029]: AVC avc: denied { write } for pid=4029 comm="tee" name="fd" dev="proc" ino=32146 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:22:31.901000 audit[4029]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe006dd9f7 a2=241 a3=1b6 items=1 ppid=3961 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:31.901000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:22:31.901000 audit: PATH item=0 name="/dev/fd/63" inode=32139 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:22:31.901000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:22:31.978882 systemd[1]: run-containerd-runc-k8s.io-919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39-runc.GtQ8BL.mount: Deactivated successfully. Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.313000 audit: BPF prog-id=164 op=LOAD Dec 13 15:22:32.313000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1d284750 a2=98 a3=3 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.313000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.314000 audit: BPF prog-id=164 op=UNLOAD Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit: BPF prog-id=165 op=LOAD Dec 13 15:22:32.315000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1d284530 a2=74 a3=540051 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.315000 audit: BPF prog-id=165 op=UNLOAD Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.315000 audit: BPF prog-id=166 op=LOAD Dec 13 15:22:32.315000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1d284560 a2=94 a3=2 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.315000 audit: BPF prog-id=166 op=UNLOAD Dec 13 15:22:32.417000 audit[3834]: USER_AUTH pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:32.418680 sshd[3834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.235 user=root Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.480000 audit: BPF prog-id=167 op=LOAD Dec 13 15:22:32.480000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1d284420 a2=40 a3=1 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.480000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.481000 audit: BPF prog-id=167 op=UNLOAD Dec 13 15:22:32.481000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.481000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd1d2844f0 a2=50 a3=7ffd1d2845d0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.481000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1d284430 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1d284460 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1d284370 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1d284480 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1d284460 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1d284450 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1d284480 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1d284460 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1d284480 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.493000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.493000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1d284450 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.493000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1d2844c0 a2=28 a3=0 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1d284270 a2=50 a3=1 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit: BPF prog-id=168 op=LOAD Dec 13 15:22:32.494000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1d284270 a2=94 a3=5 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.494000 audit: BPF prog-id=168 op=UNLOAD Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1d284320 a2=50 a3=1 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd1d284440 a2=4 a3=38 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.494000 audit[4082]: AVC avc: denied { confidentiality } for pid=4082 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:22:32.494000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1d284490 a2=94 a3=6 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { confidentiality } for pid=4082 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:22:32.495000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1d283c40 a2=94 a3=83 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.495000 audit[4082]: AVC avc: denied { confidentiality } for pid=4082 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:22:32.495000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1d283c40 a2=94 a3=83 items=0 ppid=3956 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.495000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit: BPF prog-id=169 op=LOAD Dec 13 15:22:32.520000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcba907cb0 a2=98 a3=1999999999999999 items=0 ppid=3956 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.520000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:22:32.520000 audit: BPF prog-id=169 op=UNLOAD Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit: BPF prog-id=170 op=LOAD Dec 13 15:22:32.520000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcba907b90 a2=74 a3=ffff items=0 ppid=3956 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.520000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:22:32.520000 audit: BPF prog-id=170 op=UNLOAD Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.520000 audit: BPF prog-id=171 op=LOAD Dec 13 15:22:32.520000 audit[4085]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcba907bd0 a2=40 a3=7ffcba907db0 items=0 ppid=3956 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.520000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:22:32.520000 audit: BPF prog-id=171 op=UNLOAD Dec 13 15:22:32.675931 systemd-networkd[1025]: vxlan.calico: Link UP Dec 13 15:22:32.675945 systemd-networkd[1025]: vxlan.calico: Gained carrier Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.741000 audit: BPF prog-id=172 op=LOAD Dec 13 15:22:32.741000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5a7d9f70 a2=98 a3=100 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.741000 audit: BPF prog-id=172 op=UNLOAD Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.743000 audit: BPF prog-id=173 op=LOAD Dec 13 15:22:32.743000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5a7d9d80 a2=74 a3=540051 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.743000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit: BPF prog-id=173 op=UNLOAD Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit: BPF prog-id=174 op=LOAD Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5a7d9db0 a2=94 a3=2 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit: BPF prog-id=174 op=UNLOAD Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5a7d9c80 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5a7d9cb0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5a7d9bc0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5a7d9cd0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5a7d9cb0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5a7d9ca0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5a7d9cd0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5a7d9cb0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5a7d9cd0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5a7d9ca0 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff5a7d9d10 a2=28 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.744000 audit: BPF prog-id=175 op=LOAD Dec 13 15:22:32.744000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5a7d9b80 a2=40 a3=0 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.745000 audit: BPF prog-id=175 op=UNLOAD Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff5a7d9b70 a2=50 a3=2800 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff5a7d9b70 a2=50 a3=2800 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.746000 audit: BPF prog-id=176 op=LOAD Dec 13 15:22:32.746000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5a7d9390 a2=94 a3=2 items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.747000 audit: BPF prog-id=176 op=UNLOAD Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.747000 audit: BPF prog-id=177 op=LOAD Dec 13 15:22:32.747000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5a7d9490 a2=94 a3=2d items=0 ppid=3956 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.755000 audit: BPF prog-id=178 op=LOAD Dec 13 15:22:32.755000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc58241190 a2=98 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.755000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.755000 audit: BPF prog-id=178 op=UNLOAD Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit: BPF prog-id=179 op=LOAD Dec 13 15:22:32.756000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc58240f70 a2=74 a3=540051 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.756000 audit: BPF prog-id=179 op=UNLOAD Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.756000 audit: BPF prog-id=180 op=LOAD Dec 13 15:22:32.756000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc58240fa0 a2=94 a3=2 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.756000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.756000 audit: BPF prog-id=180 op=UNLOAD Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.942000 audit: BPF prog-id=181 op=LOAD Dec 13 15:22:32.942000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc58240e60 a2=40 a3=1 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.942000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.943000 audit: BPF prog-id=181 op=UNLOAD Dec 13 15:22:32.943000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.943000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc58240f30 a2=50 a3=7ffc58241010 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.943000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58240e70 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58240ea0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58240db0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58240ec0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58240ea0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58240e90 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58240ec0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58240ea0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58240ec0 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc58240e90 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.954000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.954000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc58240f00 a2=28 a3=0 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc58240cb0 a2=50 a3=1 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit: BPF prog-id=182 op=LOAD Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc58240cb0 a2=94 a3=5 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit: BPF prog-id=182 op=UNLOAD Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc58240d60 a2=50 a3=1 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc58240e80 a2=4 a3=38 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { confidentiality } for pid=4119 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc58240ed0 a2=94 a3=6 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { confidentiality } for pid=4119 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc58240680 a2=94 a3=83 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.955000 audit[4119]: AVC avc: denied { confidentiality } for pid=4119 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:22:32.955000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc58240680 a2=94 a3=83 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.956000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.956000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc582420c0 a2=10 a3=f1f00800 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.956000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.956000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58241f60 a2=10 a3=3 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.956000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.956000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58241f00 a2=10 a3=3 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.956000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:32.956000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc58241f00 a2=10 a3=7 items=0 ppid=3956 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:32.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:22:32.965000 audit: BPF prog-id=177 op=UNLOAD Dec 13 15:22:33.067000 audit[4155]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4155 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:33.067000 audit[4155]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd6a385ad0 a2=0 a3=7ffd6a385abc items=0 ppid=3956 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:33.067000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:33.078000 audit[4158]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:33.078000 audit[4158]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe2b2c5080 a2=0 a3=7ffe2b2c506c items=0 ppid=3956 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:33.079000 audit[4157]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=4157 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:33.079000 audit[4157]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff777df4e0 a2=0 a3=7fff777df4cc items=0 ppid=3956 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:33.079000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:33.078000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:33.092000 audit[4156]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4156 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:33.092000 audit[4156]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcac0bce40 a2=0 a3=7ffcac0bce2c items=0 ppid=3956 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:33.092000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:33.491861 env[1191]: time="2024-12-13T15:22:33.491479710Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.647 [INFO][4184] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.648 [INFO][4184] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" iface="eth0" netns="/var/run/netns/cni-9740ca8b-c161-eb9a-6770-a9833f9f6c8f" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.648 [INFO][4184] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" iface="eth0" netns="/var/run/netns/cni-9740ca8b-c161-eb9a-6770-a9833f9f6c8f" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.649 [INFO][4184] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" iface="eth0" netns="/var/run/netns/cni-9740ca8b-c161-eb9a-6770-a9833f9f6c8f" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.649 [INFO][4184] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.649 [INFO][4184] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.722 [INFO][4191] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.724 [INFO][4191] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.725 [INFO][4191] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.740 [WARNING][4191] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.740 [INFO][4191] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.742 [INFO][4191] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:33.747365 env[1191]: 2024-12-13 15:22:33.744 [INFO][4184] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:22:33.752139 systemd[1]: run-netns-cni\x2d9740ca8b\x2dc161\x2deb9a\x2d6770\x2da9833f9f6c8f.mount: Deactivated successfully. Dec 13 15:22:33.754319 env[1191]: time="2024-12-13T15:22:33.754200236Z" level=info msg="TearDown network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" successfully" Dec 13 15:22:33.754490 env[1191]: time="2024-12-13T15:22:33.754455098Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" returns successfully" Dec 13 15:22:33.755928 env[1191]: time="2024-12-13T15:22:33.755885175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5x5kh,Uid:426bdb98-dfef-400a-ae3c-4abfc89d28e3,Namespace:kube-system,Attempt:1,}" Dec 13 15:22:33.984924 systemd-networkd[1025]: cali7ae4db3d6b9: Link UP Dec 13 15:22:33.989045 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:22:33.989705 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ae4db3d6b9: link becomes ready Dec 13 15:22:33.989175 systemd-networkd[1025]: cali7ae4db3d6b9: Gained carrier Dec 13 15:22:34.007646 sshd[3834]: Failed password for root from 218.92.0.235 port 22408 ssh2 Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.836 [INFO][4197] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0 coredns-7db6d8ff4d- kube-system 426bdb98-dfef-400a-ae3c-4abfc89d28e3 906 0 2024-12-13 15:21:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-fauys.gb1.brightbox.com coredns-7db6d8ff4d-5x5kh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7ae4db3d6b9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.836 [INFO][4197] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.894 [INFO][4211] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" HandleID="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.910 [INFO][4211] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" HandleID="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ab90), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-fauys.gb1.brightbox.com", "pod":"coredns-7db6d8ff4d-5x5kh", "timestamp":"2024-12-13 15:22:33.893966545 +0000 UTC"}, Hostname:"srv-fauys.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.910 [INFO][4211] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.910 [INFO][4211] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.910 [INFO][4211] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-fauys.gb1.brightbox.com' Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.913 [INFO][4211] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.919 [INFO][4211] ipam/ipam.go 372: Looking up existing affinities for host host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.926 [INFO][4211] ipam/ipam.go 489: Trying affinity for 192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.929 [INFO][4211] ipam/ipam.go 155: Attempting to load block cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.932 [INFO][4211] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.932 [INFO][4211] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.0/26 handle="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.937 [INFO][4211] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.962 [INFO][4211] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.46.0/26 handle="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.972 [INFO][4211] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.46.1/26] block=192.168.46.0/26 handle="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.973 [INFO][4211] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.1/26] handle="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.973 [INFO][4211] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:34.014616 env[1191]: 2024-12-13 15:22:33.973 [INFO][4211] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.1/26] IPv6=[] ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" HandleID="k8s-pod-network.ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.016575 env[1191]: 2024-12-13 15:22:33.976 [INFO][4197] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"426bdb98-dfef-400a-ae3c-4abfc89d28e3", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7db6d8ff4d-5x5kh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ae4db3d6b9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:34.016575 env[1191]: 2024-12-13 15:22:33.976 [INFO][4197] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.46.1/32] ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.016575 env[1191]: 2024-12-13 15:22:33.976 [INFO][4197] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7ae4db3d6b9 ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.016575 env[1191]: 2024-12-13 15:22:33.991 [INFO][4197] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.016575 env[1191]: 2024-12-13 15:22:33.993 [INFO][4197] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"426bdb98-dfef-400a-ae3c-4abfc89d28e3", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f", Pod:"coredns-7db6d8ff4d-5x5kh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ae4db3d6b9", MAC:"2e:e9:be:93:b6:cb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:34.016575 env[1191]: 2024-12-13 15:22:34.011 [INFO][4197] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5x5kh" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:22:34.045251 env[1191]: time="2024-12-13T15:22:34.042160511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:34.045251 env[1191]: time="2024-12-13T15:22:34.042252935Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:34.045251 env[1191]: time="2024-12-13T15:22:34.042278100Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:34.046294 env[1191]: time="2024-12-13T15:22:34.045661219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f pid=4236 runtime=io.containerd.runc.v2 Dec 13 15:22:34.046000 audit[4241]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:34.046000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffdc5a1dc10 a2=0 a3=7ffdc5a1dbfc items=0 ppid=3956 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:34.083421 systemd[1]: Started cri-containerd-ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f.scope. Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.121000 audit: BPF prog-id=183 op=LOAD Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4236 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333963633462633633353732303033666130303364353164636663 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4236 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333963633462633633353732303033666130303364353164636663 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit: BPF prog-id=184 op=LOAD Dec 13 15:22:34.122000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000218bf0 items=0 ppid=4236 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333963633462633633353732303033666130303364353164636663 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit: BPF prog-id=185 op=LOAD Dec 13 15:22:34.122000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000218c38 items=0 ppid=4236 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333963633462633633353732303033666130303364353164636663 Dec 13 15:22:34.122000 audit: BPF prog-id=185 op=UNLOAD Dec 13 15:22:34.122000 audit: BPF prog-id=184 op=UNLOAD Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.122000 audit: BPF prog-id=186 op=LOAD Dec 13 15:22:34.122000 audit[4246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219048 items=0 ppid=4236 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333963633462633633353732303033666130303364353164636663 Dec 13 15:22:34.173447 env[1191]: time="2024-12-13T15:22:34.173371668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5x5kh,Uid:426bdb98-dfef-400a-ae3c-4abfc89d28e3,Namespace:kube-system,Attempt:1,} returns sandbox id \"ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f\"" Dec 13 15:22:34.181404 env[1191]: time="2024-12-13T15:22:34.181336675Z" level=info msg="CreateContainer within sandbox \"ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:22:34.199593 env[1191]: time="2024-12-13T15:22:34.199514302Z" level=info msg="CreateContainer within sandbox \"ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0e21c62077dac0bad4bc0aefae3bec2c5583089d514079c7ed85439b92810fab\"" Dec 13 15:22:34.202347 env[1191]: time="2024-12-13T15:22:34.201457385Z" level=info msg="StartContainer for \"0e21c62077dac0bad4bc0aefae3bec2c5583089d514079c7ed85439b92810fab\"" Dec 13 15:22:34.224962 systemd[1]: Started cri-containerd-0e21c62077dac0bad4bc0aefae3bec2c5583089d514079c7ed85439b92810fab.scope. Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.255000 audit: BPF prog-id=187 op=LOAD Dec 13 15:22:34.256000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.256000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4236 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323163363230373764616330626164346263306165666165336265 Dec 13 15:22:34.256000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.256000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4236 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323163363230373764616330626164346263306165666165336265 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.257000 audit: BPF prog-id=188 op=LOAD Dec 13 15:22:34.257000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000277de0 items=0 ppid=4236 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323163363230373764616330626164346263306165666165336265 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit: BPF prog-id=189 op=LOAD Dec 13 15:22:34.258000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000277e28 items=0 ppid=4236 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323163363230373764616330626164346263306165666165336265 Dec 13 15:22:34.258000 audit: BPF prog-id=189 op=UNLOAD Dec 13 15:22:34.258000 audit: BPF prog-id=188 op=UNLOAD Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:34.258000 audit: BPF prog-id=190 op=LOAD Dec 13 15:22:34.258000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ba238 items=0 ppid=4236 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:34.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065323163363230373764616330626164346263306165666165336265 Dec 13 15:22:34.281131 env[1191]: time="2024-12-13T15:22:34.281063095Z" level=info msg="StartContainer for \"0e21c62077dac0bad4bc0aefae3bec2c5583089d514079c7ed85439b92810fab\" returns successfully" Dec 13 15:22:34.489373 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Dec 13 15:22:34.504633 env[1191]: time="2024-12-13T15:22:34.504578846Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:22:34.505272 env[1191]: time="2024-12-13T15:22:34.505134799Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:22:34.507000 audit[3834]: USER_AUTH pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:34.753233 systemd[1]: run-containerd-runc-k8s.io-ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f-runc.SQtjcI.mount: Deactivated successfully. Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.656 [INFO][4338] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.657 [INFO][4338] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" iface="eth0" netns="/var/run/netns/cni-1c327a41-5352-1337-6e61-0c49822dddfd" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.657 [INFO][4338] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" iface="eth0" netns="/var/run/netns/cni-1c327a41-5352-1337-6e61-0c49822dddfd" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.657 [INFO][4338] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" iface="eth0" netns="/var/run/netns/cni-1c327a41-5352-1337-6e61-0c49822dddfd" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.657 [INFO][4338] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.657 [INFO][4338] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.727 [INFO][4351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.727 [INFO][4351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.727 [INFO][4351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.748 [WARNING][4351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.748 [INFO][4351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.758 [INFO][4351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:34.765116 env[1191]: 2024-12-13 15:22:34.761 [INFO][4338] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:22:34.773297 env[1191]: time="2024-12-13T15:22:34.769950587Z" level=info msg="TearDown network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" successfully" Dec 13 15:22:34.773297 env[1191]: time="2024-12-13T15:22:34.770011261Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" returns successfully" Dec 13 15:22:34.768763 systemd[1]: run-netns-cni\x2d1c327a41\x2d5352\x2d1337\x2d6e61\x2d0c49822dddfd.mount: Deactivated successfully. Dec 13 15:22:34.773630 env[1191]: time="2024-12-13T15:22:34.773534391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-k4pvk,Uid:efdc3177-eaa3-4e0c-afc0-67a85ecb2c20,Namespace:kube-system,Attempt:1,}" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.649 [INFO][4339] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.649 [INFO][4339] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" iface="eth0" netns="/var/run/netns/cni-73b28968-f2cb-ebce-128f-0e55ac300af7" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.650 [INFO][4339] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" iface="eth0" netns="/var/run/netns/cni-73b28968-f2cb-ebce-128f-0e55ac300af7" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.650 [INFO][4339] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" iface="eth0" netns="/var/run/netns/cni-73b28968-f2cb-ebce-128f-0e55ac300af7" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.650 [INFO][4339] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.651 [INFO][4339] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.761 [INFO][4350] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.762 [INFO][4350] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.762 [INFO][4350] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.800 [WARNING][4350] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.800 [INFO][4350] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.803 [INFO][4350] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:34.820307 env[1191]: 2024-12-13 15:22:34.806 [INFO][4339] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:22:34.826379 env[1191]: time="2024-12-13T15:22:34.822868656Z" level=info msg="TearDown network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" successfully" Dec 13 15:22:34.826379 env[1191]: time="2024-12-13T15:22:34.822916719Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" returns successfully" Dec 13 15:22:34.823775 systemd[1]: run-netns-cni\x2d73b28968\x2df2cb\x2debce\x2d128f\x2d0e55ac300af7.mount: Deactivated successfully. Dec 13 15:22:34.829119 env[1191]: time="2024-12-13T15:22:34.829042475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-lwhwc,Uid:fd6e7687-a4ca-4889-bf8c-35b9181fe8d6,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:22:34.994402 kubelet[2067]: I1213 15:22:34.994114 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-5x5kh" podStartSLOduration=80.994028163 podStartE2EDuration="1m20.994028163s" podCreationTimestamp="2024-12-13 15:21:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:22:34.991784852 +0000 UTC m=+94.754541235" watchObservedRunningTime="2024-12-13 15:22:34.994028163 +0000 UTC m=+94.756784547" Dec 13 15:22:35.095081 systemd-networkd[1025]: cali866c242b505: Link UP Dec 13 15:22:35.101963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:22:35.102176 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali866c242b505: link becomes ready Dec 13 15:22:35.102393 systemd-networkd[1025]: cali866c242b505: Gained carrier Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.901 [INFO][4363] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0 coredns-7db6d8ff4d- kube-system efdc3177-eaa3-4e0c-afc0-67a85ecb2c20 917 0 2024-12-13 15:21:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-fauys.gb1.brightbox.com coredns-7db6d8ff4d-k4pvk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali866c242b505 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.902 [INFO][4363] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.958 [INFO][4384] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" HandleID="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.997 [INFO][4384] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" HandleID="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003616a0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-fauys.gb1.brightbox.com", "pod":"coredns-7db6d8ff4d-k4pvk", "timestamp":"2024-12-13 15:22:34.958606596 +0000 UTC"}, Hostname:"srv-fauys.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.997 [INFO][4384] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.997 [INFO][4384] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:34.997 [INFO][4384] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-fauys.gb1.brightbox.com' Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.013 [INFO][4384] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.036 [INFO][4384] ipam/ipam.go 372: Looking up existing affinities for host host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.050 [INFO][4384] ipam/ipam.go 489: Trying affinity for 192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.056 [INFO][4384] ipam/ipam.go 155: Attempting to load block cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.063 [INFO][4384] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.063 [INFO][4384] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.0/26 handle="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.068 [INFO][4384] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5 Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.075 [INFO][4384] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.46.0/26 handle="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.087 [INFO][4384] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.46.2/26] block=192.168.46.0/26 handle="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.087 [INFO][4384] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.2/26] handle="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.088 [INFO][4384] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:35.127052 env[1191]: 2024-12-13 15:22:35.088 [INFO][4384] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.2/26] IPv6=[] ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" HandleID="k8s-pod-network.13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.129536 env[1191]: 2024-12-13 15:22:35.090 [INFO][4363] cni-plugin/k8s.go 386: Populated endpoint ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7db6d8ff4d-k4pvk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali866c242b505", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:35.129536 env[1191]: 2024-12-13 15:22:35.090 [INFO][4363] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.46.2/32] ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.129536 env[1191]: 2024-12-13 15:22:35.090 [INFO][4363] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali866c242b505 ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.129536 env[1191]: 2024-12-13 15:22:35.098 [INFO][4363] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.129536 env[1191]: 2024-12-13 15:22:35.103 [INFO][4363] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5", Pod:"coredns-7db6d8ff4d-k4pvk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali866c242b505", MAC:"6a:0c:51:98:0c:2c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:35.129536 env[1191]: 2024-12-13 15:22:35.125 [INFO][4363] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-k4pvk" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:22:35.145000 audit[4400]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:35.147800 kernel: kauditd_printk_skb: 668 callbacks suppressed Dec 13 15:22:35.147889 kernel: audit: type=1325 audit(1734103355.145:1194): table=filter:102 family=2 entries=16 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:35.145000 audit[4400]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe565ec470 a2=0 a3=7ffe565ec45c items=0 ppid=2205 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.159345 kernel: audit: type=1300 audit(1734103355.145:1194): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe565ec470 a2=0 a3=7ffe565ec45c items=0 ppid=2205 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.163065 env[1191]: time="2024-12-13T15:22:35.162912146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:35.163355 env[1191]: time="2024-12-13T15:22:35.163290301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:35.163598 env[1191]: time="2024-12-13T15:22:35.163513814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:35.164104 env[1191]: time="2024-12-13T15:22:35.164020917Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5 pid=4418 runtime=io.containerd.runc.v2 Dec 13 15:22:35.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:35.175233 kernel: audit: type=1327 audit(1734103355.145:1194): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:35.175351 kernel: audit: type=1325 audit(1734103355.162:1195): table=nat:103 family=2 entries=14 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:35.162000 audit[4400]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:35.162000 audit[4400]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe565ec470 a2=0 a3=0 items=0 ppid=2205 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.186248 kernel: audit: type=1300 audit(1734103355.162:1195): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe565ec470 a2=0 a3=0 items=0 ppid=2205 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:35.200412 kernel: audit: type=1327 audit(1734103355.162:1195): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:35.196371 systemd-networkd[1025]: cali892f61ef515: Link UP Dec 13 15:22:35.203182 systemd-networkd[1025]: cali892f61ef515: Gained carrier Dec 13 15:22:35.203811 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali892f61ef515: link becomes ready Dec 13 15:22:35.193000 audit[4429]: NETFILTER_CFG table=filter:104 family=2 entries=30 op=nft_register_chain pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:35.208327 kernel: audit: type=1325 audit(1734103355.193:1196): table=filter:104 family=2 entries=30 op=nft_register_chain pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:35.193000 audit[4429]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffdd332fa60 a2=0 a3=7ffdd332fa4c items=0 ppid=3956 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.220255 kernel: audit: type=1300 audit(1734103355.193:1196): arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffdd332fa60 a2=0 a3=7ffdd332fa4c items=0 ppid=3956 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.230270 kernel: audit: type=1327 audit(1734103355.193:1196): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:35.193000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:35.254164 systemd[1]: Started cri-containerd-13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5.scope. Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:34.912 [INFO][4372] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0 calico-apiserver-998f79f5- calico-apiserver fd6e7687-a4ca-4889-bf8c-35b9181fe8d6 916 0 2024-12-13 15:21:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:998f79f5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-fauys.gb1.brightbox.com calico-apiserver-998f79f5-lwhwc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali892f61ef515 [] []}} ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:34.912 [INFO][4372] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:34.989 [INFO][4385] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" HandleID="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.027 [INFO][4385] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" HandleID="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011b0a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-fauys.gb1.brightbox.com", "pod":"calico-apiserver-998f79f5-lwhwc", "timestamp":"2024-12-13 15:22:34.989576784 +0000 UTC"}, Hostname:"srv-fauys.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.027 [INFO][4385] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.087 [INFO][4385] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.087 [INFO][4385] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-fauys.gb1.brightbox.com' Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.096 [INFO][4385] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.119 [INFO][4385] ipam/ipam.go 372: Looking up existing affinities for host host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.133 [INFO][4385] ipam/ipam.go 489: Trying affinity for 192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.137 [INFO][4385] ipam/ipam.go 155: Attempting to load block cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.142 [INFO][4385] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.143 [INFO][4385] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.0/26 handle="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.146 [INFO][4385] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8 Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.163 [INFO][4385] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.46.0/26 handle="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.176 [INFO][4385] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.46.3/26] block=192.168.46.0/26 handle="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.176 [INFO][4385] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.3/26] handle="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.176 [INFO][4385] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:35.262346 env[1191]: 2024-12-13 15:22:35.176 [INFO][4385] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.3/26] IPv6=[] ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" HandleID="k8s-pod-network.639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.263614 env[1191]: 2024-12-13 15:22:35.185 [INFO][4372] cni-plugin/k8s.go 386: Populated endpoint ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-998f79f5-lwhwc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali892f61ef515", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:35.263614 env[1191]: 2024-12-13 15:22:35.186 [INFO][4372] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.46.3/32] ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.263614 env[1191]: 2024-12-13 15:22:35.186 [INFO][4372] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali892f61ef515 ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.263614 env[1191]: 2024-12-13 15:22:35.231 [INFO][4372] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.263614 env[1191]: 2024-12-13 15:22:35.232 [INFO][4372] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8", Pod:"calico-apiserver-998f79f5-lwhwc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali892f61ef515", MAC:"e2:a6:00:65:ba:aa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:35.263614 env[1191]: 2024-12-13 15:22:35.257 [INFO][4372] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-lwhwc" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292278 kernel: audit: type=1400 audit(1734103355.286:1197): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292349 env[1191]: time="2024-12-13T15:22:35.288138310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:35.292349 env[1191]: time="2024-12-13T15:22:35.288245295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:35.292349 env[1191]: time="2024-12-13T15:22:35.288298260Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:35.292349 env[1191]: time="2024-12-13T15:22:35.288503775Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8 pid=4465 runtime=io.containerd.runc.v2 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.286000 audit: BPF prog-id=191 op=LOAD Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4418 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623630303030663662653937623033353163383165663032393662 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4418 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623630303030663662653937623033353163383165663032393662 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.292000 audit: BPF prog-id=192 op=LOAD Dec 13 15:22:35.292000 audit[4428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000308a10 items=0 ppid=4418 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623630303030663662653937623033353163383165663032393662 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit: BPF prog-id=193 op=LOAD Dec 13 15:22:35.293000 audit[4428]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308a58 items=0 ppid=4418 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623630303030663662653937623033353163383165663032393662 Dec 13 15:22:35.293000 audit: BPF prog-id=193 op=UNLOAD Dec 13 15:22:35.293000 audit: BPF prog-id=192 op=UNLOAD Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { perfmon } for pid=4428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit[4428]: AVC avc: denied { bpf } for pid=4428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.293000 audit: BPF prog-id=194 op=LOAD Dec 13 15:22:35.293000 audit[4428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308e68 items=0 ppid=4418 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623630303030663662653937623033353163383165663032393662 Dec 13 15:22:35.315000 audit[4476]: NETFILTER_CFG table=filter:105 family=2 entries=54 op=nft_register_chain pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:35.315000 audit[4476]: SYSCALL arch=c000003e syscall=46 success=yes exit=28720 a0=3 a1=7fff705f7dd0 a2=0 a3=7fff705f7dbc items=0 ppid=3956 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.315000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:35.334628 systemd[1]: Started cri-containerd-639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8.scope. Dec 13 15:22:35.369262 env[1191]: time="2024-12-13T15:22:35.364491791Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-k4pvk,Uid:efdc3177-eaa3-4e0c-afc0-67a85ecb2c20,Namespace:kube-system,Attempt:1,} returns sandbox id \"13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5\"" Dec 13 15:22:35.386197 env[1191]: time="2024-12-13T15:22:35.386142556Z" level=info msg="CreateContainer within sandbox \"13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:22:35.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit: BPF prog-id=195 op=LOAD Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4465 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393037326433333062353130353965383565323534623935663736 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4465 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393037326433333062353130353965383565323534623935663736 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.409000 audit: BPF prog-id=196 op=LOAD Dec 13 15:22:35.409000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a2830 items=0 ppid=4465 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393037326433333062353130353965383565323534623935663736 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit: BPF prog-id=197 op=LOAD Dec 13 15:22:35.410000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a2878 items=0 ppid=4465 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393037326433333062353130353965383565323534623935663736 Dec 13 15:22:35.410000 audit: BPF prog-id=197 op=UNLOAD Dec 13 15:22:35.410000 audit: BPF prog-id=196 op=UNLOAD Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.410000 audit: BPF prog-id=198 op=LOAD Dec 13 15:22:35.410000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a2c88 items=0 ppid=4465 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633393037326433333062353130353965383565323534623935663736 Dec 13 15:22:35.426242 env[1191]: time="2024-12-13T15:22:35.426161717Z" level=info msg="CreateContainer within sandbox \"13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a41d913f9180a97135bc116aff336a30263bb8a7b048d16db585585fb9145af6\"" Dec 13 15:22:35.427448 env[1191]: time="2024-12-13T15:22:35.427410237Z" level=info msg="StartContainer for \"a41d913f9180a97135bc116aff336a30263bb8a7b048d16db585585fb9145af6\"" Dec 13 15:22:35.455300 systemd[1]: Started cri-containerd-a41d913f9180a97135bc116aff336a30263bb8a7b048d16db585585fb9145af6.scope. Dec 13 15:22:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.493000 audit: BPF prog-id=199 op=LOAD Dec 13 15:22:35.494578 env[1191]: time="2024-12-13T15:22:35.493502573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-lwhwc,Uid:fd6e7687-a4ca-4889-bf8c-35b9181fe8d6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8\"" Dec 13 15:22:35.496000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.496000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4418 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316439313366393138306139373133356263313136616666333336 Dec 13 15:22:35.499000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.499000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4418 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.500826 env[1191]: time="2024-12-13T15:22:35.500784933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:22:35.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316439313366393138306139373133356263313136616666333336 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.501000 audit: BPF prog-id=200 op=LOAD Dec 13 15:22:35.501000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002932a0 items=0 ppid=4418 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316439313366393138306139373133356263313136616666333336 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.502000 audit: BPF prog-id=201 op=LOAD Dec 13 15:22:35.502000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002932e8 items=0 ppid=4418 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316439313366393138306139373133356263313136616666333336 Dec 13 15:22:35.504000 audit: BPF prog-id=201 op=UNLOAD Dec 13 15:22:35.504000 audit: BPF prog-id=200 op=UNLOAD Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { perfmon } for pid=4508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit[4508]: AVC avc: denied { bpf } for pid=4508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:35.504000 audit: BPF prog-id=202 op=LOAD Dec 13 15:22:35.504000 audit[4508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002936f8 items=0 ppid=4418 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:35.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134316439313366393138306139373133356263313136616666333336 Dec 13 15:22:35.532023 env[1191]: time="2024-12-13T15:22:35.531273363Z" level=info msg="StartContainer for \"a41d913f9180a97135bc116aff336a30263bb8a7b048d16db585585fb9145af6\" returns successfully" Dec 13 15:22:35.763496 systemd-networkd[1025]: cali7ae4db3d6b9: Gained IPv6LL Dec 13 15:22:36.026285 kubelet[2067]: I1213 15:22:36.026108 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-k4pvk" podStartSLOduration=82.026082657 podStartE2EDuration="1m22.026082657s" podCreationTimestamp="2024-12-13 15:21:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:22:36.008326615 +0000 UTC m=+95.771083000" watchObservedRunningTime="2024-12-13 15:22:36.026082657 +0000 UTC m=+95.788839049" Dec 13 15:22:36.039000 audit[4551]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:36.039000 audit[4551]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcf3e8f200 a2=0 a3=7ffcf3e8f1ec items=0 ppid=2205 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:36.046000 audit[4551]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:36.046000 audit[4551]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcf3e8f200 a2=0 a3=7ffcf3e8f1ec items=0 ppid=2205 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:36.078000 audit[4554]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:36.078000 audit[4554]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffceb6a6b50 a2=0 a3=7ffceb6a6b3c items=0 ppid=2205 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:36.095000 audit[4554]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:36.095000 audit[4554]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffceb6a6b50 a2=0 a3=7ffceb6a6b3c items=0 ppid=2205 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:36.492519 env[1191]: time="2024-12-13T15:22:36.492446289Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:22:36.594563 systemd-networkd[1025]: cali892f61ef515: Gained IPv6LL Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.568 [INFO][4571] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.569 [INFO][4571] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" iface="eth0" netns="/var/run/netns/cni-dc9998dc-2f76-f06a-48f0-b477d78a5f9a" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.569 [INFO][4571] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" iface="eth0" netns="/var/run/netns/cni-dc9998dc-2f76-f06a-48f0-b477d78a5f9a" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.570 [INFO][4571] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" iface="eth0" netns="/var/run/netns/cni-dc9998dc-2f76-f06a-48f0-b477d78a5f9a" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.570 [INFO][4571] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.570 [INFO][4571] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.624 [INFO][4577] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.624 [INFO][4577] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.624 [INFO][4577] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.633 [WARNING][4577] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.634 [INFO][4577] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.636 [INFO][4577] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:36.640235 env[1191]: 2024-12-13 15:22:36.638 [INFO][4571] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:22:36.645336 systemd[1]: run-netns-cni\x2ddc9998dc\x2d2f76\x2df06a\x2d48f0\x2db477d78a5f9a.mount: Deactivated successfully. Dec 13 15:22:36.648061 env[1191]: time="2024-12-13T15:22:36.647447921Z" level=info msg="TearDown network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" successfully" Dec 13 15:22:36.648061 env[1191]: time="2024-12-13T15:22:36.647607283Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" returns successfully" Dec 13 15:22:36.648753 env[1191]: time="2024-12-13T15:22:36.648715039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ntbs2,Uid:68399294-9c0a-4ef3-b240-417363b4cedc,Namespace:calico-system,Attempt:1,}" Dec 13 15:22:36.704544 sshd[3834]: Failed password for root from 218.92.0.235 port 22408 ssh2 Dec 13 15:22:36.846064 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:22:36.846550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3f299802da: link becomes ready Dec 13 15:22:36.836188 systemd-networkd[1025]: calie3f299802da: Link UP Dec 13 15:22:36.846593 systemd-networkd[1025]: calie3f299802da: Gained carrier Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.715 [INFO][4584] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0 csi-node-driver- calico-system 68399294-9c0a-4ef3-b240-417363b4cedc 947 0 2024-12-13 15:21:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-fauys.gb1.brightbox.com csi-node-driver-ntbs2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie3f299802da [] []}} ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.715 [INFO][4584] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.769 [INFO][4596] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" HandleID="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.789 [INFO][4596] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" HandleID="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ed90), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-fauys.gb1.brightbox.com", "pod":"csi-node-driver-ntbs2", "timestamp":"2024-12-13 15:22:36.769469845 +0000 UTC"}, Hostname:"srv-fauys.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.789 [INFO][4596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.789 [INFO][4596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.789 [INFO][4596] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-fauys.gb1.brightbox.com' Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.793 [INFO][4596] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.801 [INFO][4596] ipam/ipam.go 372: Looking up existing affinities for host host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.807 [INFO][4596] ipam/ipam.go 489: Trying affinity for 192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.809 [INFO][4596] ipam/ipam.go 155: Attempting to load block cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.813 [INFO][4596] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.813 [INFO][4596] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.0/26 handle="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.815 [INFO][4596] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92 Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.820 [INFO][4596] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.46.0/26 handle="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.829 [INFO][4596] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.46.4/26] block=192.168.46.0/26 handle="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.830 [INFO][4596] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.4/26] handle="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.830 [INFO][4596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:36.879208 env[1191]: 2024-12-13 15:22:36.830 [INFO][4596] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.4/26] IPv6=[] ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" HandleID="k8s-pod-network.6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.880504 env[1191]: 2024-12-13 15:22:36.832 [INFO][4584] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68399294-9c0a-4ef3-b240-417363b4cedc", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-ntbs2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie3f299802da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:36.880504 env[1191]: 2024-12-13 15:22:36.832 [INFO][4584] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.46.4/32] ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.880504 env[1191]: 2024-12-13 15:22:36.832 [INFO][4584] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie3f299802da ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.880504 env[1191]: 2024-12-13 15:22:36.848 [INFO][4584] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.880504 env[1191]: 2024-12-13 15:22:36.849 [INFO][4584] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68399294-9c0a-4ef3-b240-417363b4cedc", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92", Pod:"csi-node-driver-ntbs2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie3f299802da", MAC:"6e:7b:4d:f0:90:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:36.880504 env[1191]: 2024-12-13 15:22:36.876 [INFO][4584] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92" Namespace="calico-system" Pod="csi-node-driver-ntbs2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:22:36.902323 env[1191]: time="2024-12-13T15:22:36.901113254Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:36.902323 env[1191]: time="2024-12-13T15:22:36.901163206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:36.902323 env[1191]: time="2024-12-13T15:22:36.901181110Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:36.902323 env[1191]: time="2024-12-13T15:22:36.901390139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92 pid=4622 runtime=io.containerd.runc.v2 Dec 13 15:22:36.914000 audit[4632]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:36.914000 audit[4632]: SYSCALL arch=c000003e syscall=46 success=yes exit=21508 a0=3 a1=7ffc73e1c4d0 a2=0 a3=7ffc73e1c4bc items=0 ppid=3956 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.914000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:36.929275 systemd[1]: Started cri-containerd-6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92.scope. Dec 13 15:22:36.941728 systemd[1]: run-containerd-runc-k8s.io-6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92-runc.6trJfs.mount: Deactivated successfully. Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.970000 audit: BPF prog-id=203 op=LOAD Dec 13 15:22:36.971000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.971000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4622 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373961653061386439346266633934316137393031626462366363 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4622 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373961653061386439346266633934316137393031626462366363 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.972000 audit: BPF prog-id=204 op=LOAD Dec 13 15:22:36.972000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003a63d0 items=0 ppid=4622 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373961653061386439346266633934316137393031626462366363 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.974000 audit: BPF prog-id=205 op=LOAD Dec 13 15:22:36.974000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003a6418 items=0 ppid=4622 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373961653061386439346266633934316137393031626462366363 Dec 13 15:22:36.975000 audit: BPF prog-id=205 op=UNLOAD Dec 13 15:22:36.975000 audit: BPF prog-id=204 op=UNLOAD Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { perfmon } for pid=4633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit[4633]: AVC avc: denied { bpf } for pid=4633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:36.975000 audit: BPF prog-id=206 op=LOAD Dec 13 15:22:36.975000 audit[4633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003a6828 items=0 ppid=4622 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:36.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662373961653061386439346266633934316137393031626462366363 Dec 13 15:22:36.997808 env[1191]: time="2024-12-13T15:22:36.997732419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ntbs2,Uid:68399294-9c0a-4ef3-b240-417363b4cedc,Namespace:calico-system,Attempt:1,} returns sandbox id \"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92\"" Dec 13 15:22:37.043103 systemd-networkd[1025]: cali866c242b505: Gained IPv6LL Dec 13 15:22:37.492628 env[1191]: time="2024-12-13T15:22:37.492554828Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.607 [INFO][4670] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.608 [INFO][4670] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" iface="eth0" netns="/var/run/netns/cni-dc8546f3-d7fb-ad61-942a-7fb1568d3f70" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.608 [INFO][4670] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" iface="eth0" netns="/var/run/netns/cni-dc8546f3-d7fb-ad61-942a-7fb1568d3f70" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.609 [INFO][4670] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" iface="eth0" netns="/var/run/netns/cni-dc8546f3-d7fb-ad61-942a-7fb1568d3f70" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.610 [INFO][4670] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.610 [INFO][4670] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.661 [INFO][4676] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.661 [INFO][4676] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.661 [INFO][4676] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.672 [WARNING][4676] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.672 [INFO][4676] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.675 [INFO][4676] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:37.684498 env[1191]: 2024-12-13 15:22:37.677 [INFO][4670] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:22:37.692277 env[1191]: time="2024-12-13T15:22:37.690244785Z" level=info msg="TearDown network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" successfully" Dec 13 15:22:37.692277 env[1191]: time="2024-12-13T15:22:37.690301296Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" returns successfully" Dec 13 15:22:37.692277 env[1191]: time="2024-12-13T15:22:37.691766299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d5bbcbf99-x7fg2,Uid:b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58,Namespace:calico-system,Attempt:1,}" Dec 13 15:22:37.689740 systemd[1]: run-netns-cni\x2ddc8546f3\x2dd7fb\x2dad61\x2d942a\x2d7fb1568d3f70.mount: Deactivated successfully. Dec 13 15:22:37.953961 systemd-networkd[1025]: calib28732c00f7: Link UP Dec 13 15:22:37.962376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:22:37.962493 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib28732c00f7: link becomes ready Dec 13 15:22:37.964166 systemd-networkd[1025]: calib28732c00f7: Gained carrier Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.819 [INFO][4682] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0 calico-kube-controllers-5d5bbcbf99- calico-system b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58 955 0 2024-12-13 15:21:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5d5bbcbf99 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-fauys.gb1.brightbox.com calico-kube-controllers-5d5bbcbf99-x7fg2 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib28732c00f7 [] []}} ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.819 [INFO][4682] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.880 [INFO][4697] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" HandleID="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.895 [INFO][4697] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" HandleID="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313c60), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-fauys.gb1.brightbox.com", "pod":"calico-kube-controllers-5d5bbcbf99-x7fg2", "timestamp":"2024-12-13 15:22:37.880533258 +0000 UTC"}, Hostname:"srv-fauys.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.895 [INFO][4697] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.895 [INFO][4697] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.895 [INFO][4697] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-fauys.gb1.brightbox.com' Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.898 [INFO][4697] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.908 [INFO][4697] ipam/ipam.go 372: Looking up existing affinities for host host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.914 [INFO][4697] ipam/ipam.go 489: Trying affinity for 192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.916 [INFO][4697] ipam/ipam.go 155: Attempting to load block cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.919 [INFO][4697] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.920 [INFO][4697] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.0/26 handle="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.922 [INFO][4697] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.930 [INFO][4697] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.46.0/26 handle="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.938 [INFO][4697] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.46.5/26] block=192.168.46.0/26 handle="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.938 [INFO][4697] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.5/26] handle="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.938 [INFO][4697] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:37.983231 env[1191]: 2024-12-13 15:22:37.938 [INFO][4697] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.5/26] IPv6=[] ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" HandleID="k8s-pod-network.fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.992969 env[1191]: 2024-12-13 15:22:37.940 [INFO][4682] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0", GenerateName:"calico-kube-controllers-5d5bbcbf99-", Namespace:"calico-system", SelfLink:"", UID:"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d5bbcbf99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-5d5bbcbf99-x7fg2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib28732c00f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:37.992969 env[1191]: 2024-12-13 15:22:37.940 [INFO][4682] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.46.5/32] ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.992969 env[1191]: 2024-12-13 15:22:37.940 [INFO][4682] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib28732c00f7 ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.992969 env[1191]: 2024-12-13 15:22:37.963 [INFO][4682] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:37.992969 env[1191]: 2024-12-13 15:22:37.965 [INFO][4682] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0", GenerateName:"calico-kube-controllers-5d5bbcbf99-", Namespace:"calico-system", SelfLink:"", UID:"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d5bbcbf99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b", Pod:"calico-kube-controllers-5d5bbcbf99-x7fg2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib28732c00f7", MAC:"6e:7c:1c:2b:e6:76", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:37.992969 env[1191]: 2024-12-13 15:22:37.978 [INFO][4682] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b" Namespace="calico-system" Pod="calico-kube-controllers-5d5bbcbf99-x7fg2" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:22:38.002621 systemd-networkd[1025]: calie3f299802da: Gained IPv6LL Dec 13 15:22:38.031000 audit[4712]: NETFILTER_CFG table=filter:111 family=2 entries=42 op=nft_register_chain pid=4712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:38.031000 audit[4712]: SYSCALL arch=c000003e syscall=46 success=yes exit=21000 a0=3 a1=7fffefc92630 a2=0 a3=7fffefc9261c items=0 ppid=3956 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:38.031000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:38.132319 env[1191]: time="2024-12-13T15:22:38.124180334Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:38.132319 env[1191]: time="2024-12-13T15:22:38.124287885Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:38.132319 env[1191]: time="2024-12-13T15:22:38.124307853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:38.132319 env[1191]: time="2024-12-13T15:22:38.124618068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b pid=4728 runtime=io.containerd.runc.v2 Dec 13 15:22:38.170875 systemd[1]: Started cri-containerd-fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b.scope. Dec 13 15:22:38.181889 systemd[1]: run-containerd-runc-k8s.io-fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b-runc.FHCV1A.mount: Deactivated successfully. Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.229000 audit: BPF prog-id=207 op=LOAD Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4728 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396231343538653161306233373336616665343930333166323861 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4728 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396231343538653161306233373336616665343930333166323861 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit: BPF prog-id=208 op=LOAD Dec 13 15:22:38.230000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002edd90 items=0 ppid=4728 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396231343538653161306233373336616665343930333166323861 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.230000 audit: BPF prog-id=209 op=LOAD Dec 13 15:22:38.230000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eddd8 items=0 ppid=4728 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:38.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396231343538653161306233373336616665343930333166323861 Dec 13 15:22:38.231000 audit: BPF prog-id=209 op=UNLOAD Dec 13 15:22:38.231000 audit: BPF prog-id=208 op=UNLOAD Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:38.231000 audit: BPF prog-id=210 op=LOAD Dec 13 15:22:38.231000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e41e8 items=0 ppid=4728 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:38.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396231343538653161306233373336616665343930333166323861 Dec 13 15:22:38.294252 env[1191]: time="2024-12-13T15:22:38.294136888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d5bbcbf99-x7fg2,Uid:b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58,Namespace:calico-system,Attempt:1,} returns sandbox id \"fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b\"" Dec 13 15:22:38.388000 audit[3834]: USER_AUTH pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.235 addr=218.92.0.235 terminal=ssh res=failed' Dec 13 15:22:38.505076 env[1191]: time="2024-12-13T15:22:38.502282378Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.609 [INFO][4782] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.609 [INFO][4782] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" iface="eth0" netns="/var/run/netns/cni-36712900-9b7c-db78-330d-a09e2536e3e1" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.609 [INFO][4782] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" iface="eth0" netns="/var/run/netns/cni-36712900-9b7c-db78-330d-a09e2536e3e1" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.610 [INFO][4782] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" iface="eth0" netns="/var/run/netns/cni-36712900-9b7c-db78-330d-a09e2536e3e1" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.610 [INFO][4782] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.610 [INFO][4782] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.661 [INFO][4788] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.661 [INFO][4788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.661 [INFO][4788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.671 [WARNING][4788] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.671 [INFO][4788] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.673 [INFO][4788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:38.677268 env[1191]: 2024-12-13 15:22:38.675 [INFO][4782] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:22:38.684298 env[1191]: time="2024-12-13T15:22:38.681160319Z" level=info msg="TearDown network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" successfully" Dec 13 15:22:38.684298 env[1191]: time="2024-12-13T15:22:38.681244247Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" returns successfully" Dec 13 15:22:38.681272 systemd[1]: run-netns-cni\x2d36712900\x2d9b7c\x2ddb78\x2d330d\x2da09e2536e3e1.mount: Deactivated successfully. Dec 13 15:22:38.685080 env[1191]: time="2024-12-13T15:22:38.685040642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-llk82,Uid:2bb0905e-c268-4464-a7d2-c59f58942d08,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:22:38.953446 systemd-networkd[1025]: cali69107010c25: Link UP Dec 13 15:22:38.958673 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:22:38.958801 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali69107010c25: link becomes ready Dec 13 15:22:38.959017 systemd-networkd[1025]: cali69107010c25: Gained carrier Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.777 [INFO][4794] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0 calico-apiserver-998f79f5- calico-apiserver 2bb0905e-c268-4464-a7d2-c59f58942d08 964 0 2024-12-13 15:21:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:998f79f5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-fauys.gb1.brightbox.com calico-apiserver-998f79f5-llk82 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali69107010c25 [] []}} ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.777 [INFO][4794] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.848 [INFO][4806] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" HandleID="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.871 [INFO][4806] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" HandleID="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f4b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-fauys.gb1.brightbox.com", "pod":"calico-apiserver-998f79f5-llk82", "timestamp":"2024-12-13 15:22:38.848030694 +0000 UTC"}, Hostname:"srv-fauys.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.871 [INFO][4806] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.871 [INFO][4806] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.871 [INFO][4806] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-fauys.gb1.brightbox.com' Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.874 [INFO][4806] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.882 [INFO][4806] ipam/ipam.go 372: Looking up existing affinities for host host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.890 [INFO][4806] ipam/ipam.go 489: Trying affinity for 192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.893 [INFO][4806] ipam/ipam.go 155: Attempting to load block cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.898 [INFO][4806] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.46.0/26 host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.898 [INFO][4806] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.46.0/26 handle="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.901 [INFO][4806] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246 Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.924 [INFO][4806] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.46.0/26 handle="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.935 [INFO][4806] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.46.6/26] block=192.168.46.0/26 handle="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.936 [INFO][4806] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.46.6/26] handle="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" host="srv-fauys.gb1.brightbox.com" Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.936 [INFO][4806] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:22:38.984870 env[1191]: 2024-12-13 15:22:38.936 [INFO][4806] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.46.6/26] IPv6=[] ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" HandleID="k8s-pod-network.ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.987517 env[1191]: 2024-12-13 15:22:38.939 [INFO][4794] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"2bb0905e-c268-4464-a7d2-c59f58942d08", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-998f79f5-llk82", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali69107010c25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:38.987517 env[1191]: 2024-12-13 15:22:38.939 [INFO][4794] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.46.6/32] ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.987517 env[1191]: 2024-12-13 15:22:38.939 [INFO][4794] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali69107010c25 ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.987517 env[1191]: 2024-12-13 15:22:38.960 [INFO][4794] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:38.987517 env[1191]: 2024-12-13 15:22:38.960 [INFO][4794] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"2bb0905e-c268-4464-a7d2-c59f58942d08", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246", Pod:"calico-apiserver-998f79f5-llk82", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali69107010c25", MAC:"66:4f:b9:73:cc:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:22:38.987517 env[1191]: 2024-12-13 15:22:38.982 [INFO][4794] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246" Namespace="calico-apiserver" Pod="calico-apiserver-998f79f5-llk82" WorkloadEndpoint="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:22:39.028000 audit[4825]: NETFILTER_CFG table=filter:112 family=2 entries=46 op=nft_register_chain pid=4825 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:22:39.028000 audit[4825]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffc2ebe3a70 a2=0 a3=7ffc2ebe3a5c items=0 ppid=3956 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:39.028000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:22:39.056036 env[1191]: time="2024-12-13T15:22:39.055869749Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:22:39.056505 env[1191]: time="2024-12-13T15:22:39.056453802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:22:39.056661 env[1191]: time="2024-12-13T15:22:39.056486146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:22:39.057001 env[1191]: time="2024-12-13T15:22:39.056931539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246 pid=4834 runtime=io.containerd.runc.v2 Dec 13 15:22:39.092128 systemd[1]: Started cri-containerd-ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246.scope. Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.146000 audit: BPF prog-id=211 op=LOAD Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4834 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:39.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643633623239353430306563626564303864316532626562643565 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4834 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:39.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643633623239353430306563626564303864316532626562643565 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.148000 audit: BPF prog-id=212 op=LOAD Dec 13 15:22:39.148000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000396530 items=0 ppid=4834 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:39.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643633623239353430306563626564303864316532626562643565 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.150000 audit: BPF prog-id=213 op=LOAD Dec 13 15:22:39.150000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000396578 items=0 ppid=4834 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:39.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643633623239353430306563626564303864316532626562643565 Dec 13 15:22:39.152000 audit: BPF prog-id=213 op=UNLOAD Dec 13 15:22:39.152000 audit: BPF prog-id=212 op=UNLOAD Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:39.152000 audit: BPF prog-id=214 op=LOAD Dec 13 15:22:39.152000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000396988 items=0 ppid=4834 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:39.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643633623239353430306563626564303864316532626562643565 Dec 13 15:22:39.208361 env[1191]: time="2024-12-13T15:22:39.208201870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-998f79f5-llk82,Uid:2bb0905e-c268-4464-a7d2-c59f58942d08,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246\"" Dec 13 15:22:39.667065 systemd-networkd[1025]: calib28732c00f7: Gained IPv6LL Dec 13 15:22:40.357582 env[1191]: time="2024-12-13T15:22:40.357517749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:40.361183 env[1191]: time="2024-12-13T15:22:40.361141017Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:40.364250 env[1191]: time="2024-12-13T15:22:40.364198621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:40.366184 env[1191]: time="2024-12-13T15:22:40.366128796Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:40.368476 env[1191]: time="2024-12-13T15:22:40.367530913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:22:40.372871 env[1191]: time="2024-12-13T15:22:40.372828155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:22:40.380770 env[1191]: time="2024-12-13T15:22:40.380662862Z" level=info msg="CreateContainer within sandbox \"639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:22:40.400521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3495676745.mount: Deactivated successfully. Dec 13 15:22:40.406298 env[1191]: time="2024-12-13T15:22:40.406092348Z" level=info msg="CreateContainer within sandbox \"639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"bdf0e0feaad930e167a8a6884e3809db7e8461d205875f3a0b4514eda6ccc04c\"" Dec 13 15:22:40.409977 env[1191]: time="2024-12-13T15:22:40.409559980Z" level=info msg="StartContainer for \"bdf0e0feaad930e167a8a6884e3809db7e8461d205875f3a0b4514eda6ccc04c\"" Dec 13 15:22:40.437795 systemd-networkd[1025]: cali69107010c25: Gained IPv6LL Dec 13 15:22:40.471824 sshd[3834]: Failed password for root from 218.92.0.235 port 22408 ssh2 Dec 13 15:22:40.491229 systemd[1]: Started cri-containerd-bdf0e0feaad930e167a8a6884e3809db7e8461d205875f3a0b4514eda6ccc04c.scope. Dec 13 15:22:40.529639 kernel: kauditd_printk_skb: 366 callbacks suppressed Dec 13 15:22:40.529855 kernel: audit: type=1400 audit(1734103360.527:1314): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.540243 kernel: audit: type=1400 audit(1734103360.527:1315): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.547245 kernel: audit: type=1400 audit(1734103360.527:1316): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.547521 kernel: audit: type=1400 audit(1734103360.527:1317): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.562271 kernel: audit: type=1400 audit(1734103360.527:1318): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.562361 kernel: audit: type=1400 audit(1734103360.527:1319): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.569442 kernel: audit: type=1400 audit(1734103360.527:1320): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.577253 kernel: audit: type=1400 audit(1734103360.527:1321): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.583270 kernel: audit: type=1400 audit(1734103360.527:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.591272 kernel: audit: type=1400 audit(1734103360.529:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.529000 audit: BPF prog-id=215 op=LOAD Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4465 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:40.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663065306665616164393330653136376138613638383465333830 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4465 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:40.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663065306665616164393330653136376138613638383465333830 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit: BPF prog-id=216 op=LOAD Dec 13 15:22:40.534000 audit[4875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003131f0 items=0 ppid=4465 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:40.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663065306665616164393330653136376138613638383465333830 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit: BPF prog-id=217 op=LOAD Dec 13 15:22:40.534000 audit[4875]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000313238 items=0 ppid=4465 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:40.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663065306665616164393330653136376138613638383465333830 Dec 13 15:22:40.534000 audit: BPF prog-id=217 op=UNLOAD Dec 13 15:22:40.534000 audit: BPF prog-id=216 op=UNLOAD Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { perfmon } for pid=4875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit[4875]: AVC avc: denied { bpf } for pid=4875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:40.534000 audit: BPF prog-id=218 op=LOAD Dec 13 15:22:40.534000 audit[4875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000313648 items=0 ppid=4465 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:40.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663065306665616164393330653136376138613638383465333830 Dec 13 15:22:40.620530 env[1191]: time="2024-12-13T15:22:40.613542882Z" level=info msg="StartContainer for \"bdf0e0feaad930e167a8a6884e3809db7e8461d205875f3a0b4514eda6ccc04c\" returns successfully" Dec 13 15:22:41.058651 kubelet[2067]: I1213 15:22:41.058526 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-998f79f5-lwhwc" podStartSLOduration=71.183558101 podStartE2EDuration="1m16.058439632s" podCreationTimestamp="2024-12-13 15:21:25 +0000 UTC" firstStartedPulling="2024-12-13 15:22:35.496843123 +0000 UTC m=+95.259599500" lastFinishedPulling="2024-12-13 15:22:40.371724648 +0000 UTC m=+100.134481031" observedRunningTime="2024-12-13 15:22:41.05635991 +0000 UTC m=+100.819116282" watchObservedRunningTime="2024-12-13 15:22:41.058439632 +0000 UTC m=+100.821196008" Dec 13 15:22:41.122000 audit[4905]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:41.122000 audit[4905]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff7b2aa210 a2=0 a3=7fff7b2aa1fc items=0 ppid=2205 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:41.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:41.128000 audit[4905]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:41.128000 audit[4905]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff7b2aa210 a2=0 a3=7fff7b2aa1fc items=0 ppid=2205 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:41.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:41.394271 systemd[1]: run-containerd-runc-k8s.io-bdf0e0feaad930e167a8a6884e3809db7e8461d205875f3a0b4514eda6ccc04c-runc.Vm66X4.mount: Deactivated successfully. Dec 13 15:22:42.097000 audit[4885]: AVC avc: denied { watch } for pid=4885 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_21_40.3710473740/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c932 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c310,c932 tclass=file permissive=0 Dec 13 15:22:42.097000 audit[4885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00117e9c0 a2=fc6 a3=0 items=0 ppid=4465 pid=4885 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c932 key=(null) Dec 13 15:22:42.097000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:22:42.224406 env[1191]: time="2024-12-13T15:22:42.224308824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:42.228982 env[1191]: time="2024-12-13T15:22:42.228121954Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:42.231503 env[1191]: time="2024-12-13T15:22:42.231461834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:42.233212 env[1191]: time="2024-12-13T15:22:42.233169604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:42.234167 env[1191]: time="2024-12-13T15:22:42.234124586Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:22:42.238000 audit[4907]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:42.238000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeff84b110 a2=0 a3=7ffeff84b0fc items=0 ppid=2205 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:42.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:42.240382 env[1191]: time="2024-12-13T15:22:42.240339547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 15:22:42.244000 audit[4907]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:42.244000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffeff84b110 a2=0 a3=7ffeff84b0fc items=0 ppid=2205 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:42.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:42.255388 env[1191]: time="2024-12-13T15:22:42.255306411Z" level=info msg="CreateContainer within sandbox \"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:22:42.382986 env[1191]: time="2024-12-13T15:22:42.382767965Z" level=info msg="CreateContainer within sandbox \"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6c29696b6a0229a07632a3f3f0c5fae800dcae1499387ce67e821f2d68c074d9\"" Dec 13 15:22:42.383982 env[1191]: time="2024-12-13T15:22:42.383941953Z" level=info msg="StartContainer for \"6c29696b6a0229a07632a3f3f0c5fae800dcae1499387ce67e821f2d68c074d9\"" Dec 13 15:22:42.436859 systemd[1]: Started cri-containerd-6c29696b6a0229a07632a3f3f0c5fae800dcae1499387ce67e821f2d68c074d9.scope. Dec 13 15:22:42.445855 systemd[1]: run-containerd-runc-k8s.io-6c29696b6a0229a07632a3f3f0c5fae800dcae1499387ce67e821f2d68c074d9-runc.9O0SqZ.mount: Deactivated successfully. Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7efc8c223718 items=0 ppid=4622 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:42.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323936393662366130323239613037363332613366336630633566 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit: BPF prog-id=219 op=LOAD Dec 13 15:22:42.506000 audit[4916]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000217648 items=0 ppid=4622 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:42.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323936393662366130323239613037363332613366336630633566 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.506000 audit: BPF prog-id=220 op=LOAD Dec 13 15:22:42.506000 audit[4916]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000217698 items=0 ppid=4622 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:42.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323936393662366130323239613037363332613366336630633566 Dec 13 15:22:42.507000 audit: BPF prog-id=220 op=UNLOAD Dec 13 15:22:42.507000 audit: BPF prog-id=219 op=UNLOAD Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { perfmon } for pid=4916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit[4916]: AVC avc: denied { bpf } for pid=4916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:42.507000 audit: BPF prog-id=221 op=LOAD Dec 13 15:22:42.507000 audit[4916]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000217728 items=0 ppid=4622 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:42.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663323936393662366130323239613037363332613366336630633566 Dec 13 15:22:42.537247 env[1191]: time="2024-12-13T15:22:42.536190380Z" level=info msg="StartContainer for \"6c29696b6a0229a07632a3f3f0c5fae800dcae1499387ce67e821f2d68c074d9\" returns successfully" Dec 13 15:22:42.650946 sshd[3834]: Received disconnect from 218.92.0.235 port 22408:11: [preauth] Dec 13 15:22:42.650946 sshd[3834]: Disconnected from authenticating user root 218.92.0.235 port 22408 [preauth] Dec 13 15:22:42.650971 sshd[3834]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.235 user=root Dec 13 15:22:42.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.14.190:22-218.92.0.235:22408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:22:42.656259 systemd[1]: sshd@11-10.244.14.190:22-218.92.0.235:22408.service: Deactivated successfully. Dec 13 15:22:46.080700 env[1191]: time="2024-12-13T15:22:46.080577714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.083422 env[1191]: time="2024-12-13T15:22:46.083381178Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.085635 env[1191]: time="2024-12-13T15:22:46.085600391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.087372 env[1191]: time="2024-12-13T15:22:46.087329931Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.088582 env[1191]: time="2024-12-13T15:22:46.088534836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 15:22:46.097821 env[1191]: time="2024-12-13T15:22:46.097784616Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:22:46.242776 env[1191]: time="2024-12-13T15:22:46.242572237Z" level=info msg="CreateContainer within sandbox \"fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 15:22:46.265544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount108622772.mount: Deactivated successfully. Dec 13 15:22:46.272063 env[1191]: time="2024-12-13T15:22:46.272011646Z" level=info msg="CreateContainer within sandbox \"fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce\"" Dec 13 15:22:46.273494 env[1191]: time="2024-12-13T15:22:46.273406029Z" level=info msg="StartContainer for \"e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce\"" Dec 13 15:22:46.316350 systemd[1]: Started cri-containerd-e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce.scope. Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.369746 kernel: kauditd_printk_skb: 106 callbacks suppressed Dec 13 15:22:46.369921 kernel: audit: type=1400 audit(1734103366.362:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.379194 kernel: audit: type=1400 audit(1734103366.362:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.379478 kernel: audit: type=1400 audit(1734103366.362:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.394561 kernel: audit: type=1400 audit(1734103366.362:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.394649 kernel: audit: type=1400 audit(1734103366.362:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.395148 kernel: audit: type=1400 audit(1734103366.362:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.399592 kernel: audit: type=1400 audit(1734103366.362:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.404536 kernel: audit: type=1400 audit(1734103366.362:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.409358 kernel: audit: type=1400 audit(1734103366.362:1352): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.423279 kernel: audit: type=1400 audit(1734103366.363:1353): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.363000 audit: BPF prog-id=222 op=LOAD Dec 13 15:22:46.372000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.372000 audit[4965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4728 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616434316336323662343036306463313938633034386634393464 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4728 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616434316336323662343036306463313938633034386634393464 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit: BPF prog-id=223 op=LOAD Dec 13 15:22:46.373000 audit[4965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000392c20 items=0 ppid=4728 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616434316336323662343036306463313938633034386634393464 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.373000 audit: BPF prog-id=224 op=LOAD Dec 13 15:22:46.373000 audit[4965]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000392c68 items=0 ppid=4728 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616434316336323662343036306463313938633034386634393464 Dec 13 15:22:46.374000 audit: BPF prog-id=224 op=UNLOAD Dec 13 15:22:46.374000 audit: BPF prog-id=223 op=UNLOAD Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.374000 audit: BPF prog-id=225 op=LOAD Dec 13 15:22:46.374000 audit[4965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000393078 items=0 ppid=4728 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616434316336323662343036306463313938633034386634393464 Dec 13 15:22:46.477505 env[1191]: time="2024-12-13T15:22:46.477428810Z" level=info msg="StartContainer for \"e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce\" returns successfully" Dec 13 15:22:46.492206 env[1191]: time="2024-12-13T15:22:46.492153951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.495071 env[1191]: time="2024-12-13T15:22:46.495029000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.497097 env[1191]: time="2024-12-13T15:22:46.497059522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.499794 env[1191]: time="2024-12-13T15:22:46.499758298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:46.500850 env[1191]: time="2024-12-13T15:22:46.500811218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:22:46.504795 env[1191]: time="2024-12-13T15:22:46.504758665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:22:46.506320 env[1191]: time="2024-12-13T15:22:46.506272166Z" level=info msg="CreateContainer within sandbox \"ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:22:46.520452 env[1191]: time="2024-12-13T15:22:46.520390669Z" level=info msg="CreateContainer within sandbox \"ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ce9fa3898bbb0ac4619654625952d3db7b62c7e5c65149e9de14fbe855764f46\"" Dec 13 15:22:46.523502 env[1191]: time="2024-12-13T15:22:46.523464005Z" level=info msg="StartContainer for \"ce9fa3898bbb0ac4619654625952d3db7b62c7e5c65149e9de14fbe855764f46\"" Dec 13 15:22:46.559233 systemd[1]: Started cri-containerd-ce9fa3898bbb0ac4619654625952d3db7b62c7e5c65149e9de14fbe855764f46.scope. Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.603000 audit: BPF prog-id=226 op=LOAD Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4834 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396661333839386262623061633436313936353436323539353264 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4834 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396661333839386262623061633436313936353436323539353264 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.604000 audit: BPF prog-id=227 op=LOAD Dec 13 15:22:46.604000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032a640 items=0 ppid=4834 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396661333839386262623061633436313936353436323539353264 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit: BPF prog-id=228 op=LOAD Dec 13 15:22:46.605000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032a688 items=0 ppid=4834 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396661333839386262623061633436313936353436323539353264 Dec 13 15:22:46.605000 audit: BPF prog-id=228 op=UNLOAD Dec 13 15:22:46.605000 audit: BPF prog-id=227 op=UNLOAD Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:46.605000 audit: BPF prog-id=229 op=LOAD Dec 13 15:22:46.605000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032aa98 items=0 ppid=4834 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:46.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365396661333839386262623061633436313936353436323539353264 Dec 13 15:22:46.699461 env[1191]: time="2024-12-13T15:22:46.699405405Z" level=info msg="StartContainer for \"ce9fa3898bbb0ac4619654625952d3db7b62c7e5c65149e9de14fbe855764f46\" returns successfully" Dec 13 15:22:47.259529 kubelet[2067]: I1213 15:22:47.255388 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5d5bbcbf99-x7fg2" podStartSLOduration=74.413989225 podStartE2EDuration="1m22.209317062s" podCreationTimestamp="2024-12-13 15:21:25 +0000 UTC" firstStartedPulling="2024-12-13 15:22:38.297172541 +0000 UTC m=+98.059928913" lastFinishedPulling="2024-12-13 15:22:46.092500374 +0000 UTC m=+105.855256750" observedRunningTime="2024-12-13 15:22:47.169697674 +0000 UTC m=+106.932454050" watchObservedRunningTime="2024-12-13 15:22:47.209317062 +0000 UTC m=+106.972073438" Dec 13 15:22:47.270697 kubelet[2067]: I1213 15:22:47.270622 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-998f79f5-llk82" podStartSLOduration=74.982568375 podStartE2EDuration="1m22.270598698s" podCreationTimestamp="2024-12-13 15:21:25 +0000 UTC" firstStartedPulling="2024-12-13 15:22:39.214554545 +0000 UTC m=+98.977310922" lastFinishedPulling="2024-12-13 15:22:46.502584856 +0000 UTC m=+106.265341245" observedRunningTime="2024-12-13 15:22:47.191635135 +0000 UTC m=+106.954391519" watchObservedRunningTime="2024-12-13 15:22:47.270598698 +0000 UTC m=+107.033355077" Dec 13 15:22:47.326000 audit[5049]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:47.326000 audit[5049]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff1948b230 a2=0 a3=7fff1948b21c items=0 ppid=2205 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:47.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:47.344000 audit[5049]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:47.344000 audit[5049]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff1948b230 a2=0 a3=7fff1948b21c items=0 ppid=2205 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:47.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:48.184000 audit[5009]: AVC avc: denied { watch } for pid=5009 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_21_40.3267589723/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c750 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c675,c750 tclass=file permissive=0 Dec 13 15:22:48.184000 audit[5009]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00037ee40 a2=fc6 a3=0 items=0 ppid=4834 pid=5009 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c750 key=(null) Dec 13 15:22:48.184000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:22:48.239000 audit[5051]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:48.239000 audit[5051]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffba29a270 a2=0 a3=7fffba29a25c items=0 ppid=2205 pid=5051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:48.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:48.246000 audit[5051]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:22:48.246000 audit[5051]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffba29a270 a2=0 a3=7fffba29a25c items=0 ppid=2205 pid=5051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:48.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:22:49.013665 env[1191]: time="2024-12-13T15:22:49.013573944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:49.017142 env[1191]: time="2024-12-13T15:22:49.017090164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:49.019127 env[1191]: time="2024-12-13T15:22:49.019090597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:49.022128 env[1191]: time="2024-12-13T15:22:49.022091169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:22:49.023133 env[1191]: time="2024-12-13T15:22:49.023092578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:22:49.046689 env[1191]: time="2024-12-13T15:22:49.046357181Z" level=info msg="CreateContainer within sandbox \"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:22:49.084987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2646128261.mount: Deactivated successfully. Dec 13 15:22:49.089306 env[1191]: time="2024-12-13T15:22:49.089168032Z" level=info msg="CreateContainer within sandbox \"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"83ff53f52587cdb6045a4f8a78685366687988e256fb6235555099723a59570c\"" Dec 13 15:22:49.093106 env[1191]: time="2024-12-13T15:22:49.092306891Z" level=info msg="StartContainer for \"83ff53f52587cdb6045a4f8a78685366687988e256fb6235555099723a59570c\"" Dec 13 15:22:49.137605 systemd[1]: run-containerd-runc-k8s.io-83ff53f52587cdb6045a4f8a78685366687988e256fb6235555099723a59570c-runc.gt8f94.mount: Deactivated successfully. Dec 13 15:22:49.150399 systemd[1]: Started cri-containerd-83ff53f52587cdb6045a4f8a78685366687988e256fb6235555099723a59570c.scope. Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa4543ab9f8 items=0 ppid=4622 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:49.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833666635336635323538376364623630343561346638613738363835 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit: BPF prog-id=230 op=LOAD Dec 13 15:22:49.208000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022ea38 items=0 ppid=4622 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:49.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833666635336635323538376364623630343561346638613738363835 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit: BPF prog-id=231 op=LOAD Dec 13 15:22:49.208000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022ea88 items=0 ppid=4622 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:49.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833666635336635323538376364623630343561346638613738363835 Dec 13 15:22:49.208000 audit: BPF prog-id=231 op=UNLOAD Dec 13 15:22:49.208000 audit: BPF prog-id=230 op=UNLOAD Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:22:49.208000 audit: BPF prog-id=232 op=LOAD Dec 13 15:22:49.208000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022eb18 items=0 ppid=4622 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:22:49.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833666635336635323538376364623630343561346638613738363835 Dec 13 15:22:49.234883 env[1191]: time="2024-12-13T15:22:49.234524828Z" level=info msg="StartContainer for \"83ff53f52587cdb6045a4f8a78685366687988e256fb6235555099723a59570c\" returns successfully" Dec 13 15:22:49.826122 kubelet[2067]: I1213 15:22:49.824750 2067 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:22:49.828089 kubelet[2067]: I1213 15:22:49.828061 2067 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:22:50.135705 kubelet[2067]: I1213 15:22:50.135518 2067 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ntbs2" podStartSLOduration=73.100524416 podStartE2EDuration="1m25.135487659s" podCreationTimestamp="2024-12-13 15:21:25 +0000 UTC" firstStartedPulling="2024-12-13 15:22:36.999805371 +0000 UTC m=+96.762561747" lastFinishedPulling="2024-12-13 15:22:49.034768605 +0000 UTC m=+108.797524990" observedRunningTime="2024-12-13 15:22:50.134746564 +0000 UTC m=+109.897502943" watchObservedRunningTime="2024-12-13 15:22:50.135487659 +0000 UTC m=+109.898244043" Dec 13 15:22:54.241000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:54.247301 kernel: kauditd_printk_skb: 162 callbacks suppressed Dec 13 15:22:54.247447 kernel: audit: type=1400 audit(1734103374.241:1391): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:54.241000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002067120 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:54.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:54.281093 kernel: audit: type=1300 audit(1734103374.241:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002067120 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:54.281234 kernel: audit: type=1327 audit(1734103374.241:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:54.281322 kernel: audit: type=1400 audit(1734103374.246:1392): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:54.246000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:54.246000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002582180 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:54.295755 kernel: audit: type=1300 audit(1734103374.246:1392): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002582180 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:22:54.296176 kernel: audit: type=1327 audit(1734103374.246:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:54.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:22:56.116000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.126248 kernel: audit: type=1400 audit(1734103376.116:1393): avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.116000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.116000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d5de040 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.141564 kernel: audit: type=1400 audit(1734103376.116:1394): avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.141806 kernel: audit: type=1300 audit(1734103376.116:1393): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d5de040 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.142372 kernel: audit: type=1327 audit(1734103376.116:1393): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.120000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.120000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0091976b0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.120000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.116000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0090c75c0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.123000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.123000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d5de080 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.123000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.123000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009197860 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.136000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:22:56.136000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0090c76e0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:22:56.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:22:56.639149 systemd[1]: run-containerd-runc-k8s.io-919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39-runc.OZdFg5.mount: Deactivated successfully. Dec 13 15:23:00.480563 env[1191]: time="2024-12-13T15:23:00.480113527Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.776 [WARNING][5142] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8", Pod:"calico-apiserver-998f79f5-lwhwc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali892f61ef515", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.780 [INFO][5142] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.780 [INFO][5142] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" iface="eth0" netns="" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.780 [INFO][5142] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.781 [INFO][5142] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.908 [INFO][5148] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.908 [INFO][5148] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.909 [INFO][5148] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.923 [WARNING][5148] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.923 [INFO][5148] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.925 [INFO][5148] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:00.930066 env[1191]: 2024-12-13 15:23:00.928 [INFO][5142] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:00.933583 env[1191]: time="2024-12-13T15:23:00.930040417Z" level=info msg="TearDown network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" successfully" Dec 13 15:23:00.933583 env[1191]: time="2024-12-13T15:23:00.930123825Z" level=info msg="StopPodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" returns successfully" Dec 13 15:23:00.934261 env[1191]: time="2024-12-13T15:23:00.934188339Z" level=info msg="RemovePodSandbox for \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:23:00.934561 env[1191]: time="2024-12-13T15:23:00.934451245Z" level=info msg="Forcibly stopping sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\"" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:00.998 [WARNING][5167] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd6e7687-a4ca-4889-bf8c-35b9181fe8d6", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"639072d330b51059e85e254b95f76ef9c268820c0be93c7999f0d7221b7acfc8", Pod:"calico-apiserver-998f79f5-lwhwc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali892f61ef515", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:00.998 [INFO][5167] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:00.998 [INFO][5167] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" iface="eth0" netns="" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:00.998 [INFO][5167] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:00.998 [INFO][5167] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.037 [INFO][5173] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.038 [INFO][5173] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.038 [INFO][5173] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.049 [WARNING][5173] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.049 [INFO][5173] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" HandleID="k8s-pod-network.721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--lwhwc-eth0" Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.051 [INFO][5173] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.056595 env[1191]: 2024-12-13 15:23:01.053 [INFO][5167] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0" Dec 13 15:23:01.057941 env[1191]: time="2024-12-13T15:23:01.057658142Z" level=info msg="TearDown network for sandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" successfully" Dec 13 15:23:01.063472 env[1191]: time="2024-12-13T15:23:01.063434353Z" level=info msg="RemovePodSandbox \"721ee6b5a5a6241e89e3e0fe2299f7b079061e72cdece29964d0eadc67335dd0\" returns successfully" Dec 13 15:23:01.064477 env[1191]: time="2024-12-13T15:23:01.064423192Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.130 [WARNING][5191] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5", Pod:"coredns-7db6d8ff4d-k4pvk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali866c242b505", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.130 [INFO][5191] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.130 [INFO][5191] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" iface="eth0" netns="" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.130 [INFO][5191] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.130 [INFO][5191] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.172 [INFO][5197] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.173 [INFO][5197] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.173 [INFO][5197] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.181 [WARNING][5197] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.181 [INFO][5197] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.183 [INFO][5197] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.189032 env[1191]: 2024-12-13 15:23:01.185 [INFO][5191] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.189032 env[1191]: time="2024-12-13T15:23:01.187418250Z" level=info msg="TearDown network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" successfully" Dec 13 15:23:01.189032 env[1191]: time="2024-12-13T15:23:01.187463648Z" level=info msg="StopPodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" returns successfully" Dec 13 15:23:01.201750 env[1191]: time="2024-12-13T15:23:01.201472743Z" level=info msg="RemovePodSandbox for \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:23:01.201750 env[1191]: time="2024-12-13T15:23:01.201523847Z" level=info msg="Forcibly stopping sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\"" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.275 [WARNING][5216] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"efdc3177-eaa3-4e0c-afc0-67a85ecb2c20", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"13b60000f6be97b0351c81ef0296b97aab3257a0bb278ce3fbd4adf4404e03f5", Pod:"coredns-7db6d8ff4d-k4pvk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali866c242b505", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.276 [INFO][5216] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.276 [INFO][5216] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" iface="eth0" netns="" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.276 [INFO][5216] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.276 [INFO][5216] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.351 [INFO][5222] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.352 [INFO][5222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.352 [INFO][5222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.365 [WARNING][5222] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.365 [INFO][5222] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" HandleID="k8s-pod-network.8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--k4pvk-eth0" Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.369 [INFO][5222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.391547 env[1191]: 2024-12-13 15:23:01.378 [INFO][5216] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5" Dec 13 15:23:01.394335 env[1191]: time="2024-12-13T15:23:01.392671010Z" level=info msg="TearDown network for sandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" successfully" Dec 13 15:23:01.401819 env[1191]: time="2024-12-13T15:23:01.401781001Z" level=info msg="RemovePodSandbox \"8a2f21c1b4354fdab3ff801c9e3fdbbc9aeb6f265ae1ec607ddb616e28b16ff5\" returns successfully" Dec 13 15:23:01.411833 env[1191]: time="2024-12-13T15:23:01.411791931Z" level=info msg="StopPodSandbox for \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\"" Dec 13 15:23:01.412248 env[1191]: time="2024-12-13T15:23:01.412091078Z" level=info msg="TearDown network for sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" successfully" Dec 13 15:23:01.412437 env[1191]: time="2024-12-13T15:23:01.412402682Z" level=info msg="StopPodSandbox for \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" returns successfully" Dec 13 15:23:01.413131 env[1191]: time="2024-12-13T15:23:01.413095298Z" level=info msg="RemovePodSandbox for \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\"" Dec 13 15:23:01.413351 env[1191]: time="2024-12-13T15:23:01.413286495Z" level=info msg="Forcibly stopping sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\"" Dec 13 15:23:01.413600 env[1191]: time="2024-12-13T15:23:01.413532602Z" level=info msg="TearDown network for sandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" successfully" Dec 13 15:23:01.426959 env[1191]: time="2024-12-13T15:23:01.426915455Z" level=info msg="RemovePodSandbox \"1b1dc3dd333be78605ff379719c55ca17d5e12966a85494692f75cf200a7151f\" returns successfully" Dec 13 15:23:01.427633 env[1191]: time="2024-12-13T15:23:01.427585584Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.501 [WARNING][5241] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0", GenerateName:"calico-kube-controllers-5d5bbcbf99-", Namespace:"calico-system", SelfLink:"", UID:"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d5bbcbf99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b", Pod:"calico-kube-controllers-5d5bbcbf99-x7fg2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib28732c00f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.501 [INFO][5241] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.502 [INFO][5241] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" iface="eth0" netns="" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.502 [INFO][5241] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.502 [INFO][5241] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.550 [INFO][5247] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.550 [INFO][5247] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.550 [INFO][5247] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.559 [WARNING][5247] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.559 [INFO][5247] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.561 [INFO][5247] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.565098 env[1191]: 2024-12-13 15:23:01.563 [INFO][5241] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.567274 env[1191]: time="2024-12-13T15:23:01.565142969Z" level=info msg="TearDown network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" successfully" Dec 13 15:23:01.567274 env[1191]: time="2024-12-13T15:23:01.565187571Z" level=info msg="StopPodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" returns successfully" Dec 13 15:23:01.567713 env[1191]: time="2024-12-13T15:23:01.567677374Z" level=info msg="RemovePodSandbox for \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:23:01.567910 env[1191]: time="2024-12-13T15:23:01.567853212Z" level=info msg="Forcibly stopping sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\"" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.653 [WARNING][5266] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0", GenerateName:"calico-kube-controllers-5d5bbcbf99-", Namespace:"calico-system", SelfLink:"", UID:"b9f53d0e-450a-4b47-9dd9-5bd5a90cbd58", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d5bbcbf99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"fb9b1458e1a0b3736afe49031f28a123c92422dd79eac8c3c80b785ce6a1813b", Pod:"calico-kube-controllers-5d5bbcbf99-x7fg2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.46.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib28732c00f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.653 [INFO][5266] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.653 [INFO][5266] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" iface="eth0" netns="" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.653 [INFO][5266] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.653 [INFO][5266] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.716 [INFO][5272] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.716 [INFO][5272] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.716 [INFO][5272] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.725 [WARNING][5272] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.725 [INFO][5272] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" HandleID="k8s-pod-network.6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--kube--controllers--5d5bbcbf99--x7fg2-eth0" Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.727 [INFO][5272] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.730582 env[1191]: 2024-12-13 15:23:01.728 [INFO][5266] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68" Dec 13 15:23:01.732094 env[1191]: time="2024-12-13T15:23:01.730620101Z" level=info msg="TearDown network for sandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" successfully" Dec 13 15:23:01.736566 env[1191]: time="2024-12-13T15:23:01.736518887Z" level=info msg="RemovePodSandbox \"6917b67beb7fde43a71d2771aa0ba5e555470a059c83da0c1da475c418c51b68\" returns successfully" Dec 13 15:23:01.737385 env[1191]: time="2024-12-13T15:23:01.737340633Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.798 [WARNING][5292] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68399294-9c0a-4ef3-b240-417363b4cedc", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92", Pod:"csi-node-driver-ntbs2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie3f299802da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.799 [INFO][5292] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.799 [INFO][5292] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" iface="eth0" netns="" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.799 [INFO][5292] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.799 [INFO][5292] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.848 [INFO][5298] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.848 [INFO][5298] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.848 [INFO][5298] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.855 [WARNING][5298] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.855 [INFO][5298] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.858 [INFO][5298] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.863413 env[1191]: 2024-12-13 15:23:01.859 [INFO][5292] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.864457 env[1191]: time="2024-12-13T15:23:01.864339083Z" level=info msg="TearDown network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" successfully" Dec 13 15:23:01.864457 env[1191]: time="2024-12-13T15:23:01.864386562Z" level=info msg="StopPodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" returns successfully" Dec 13 15:23:01.865253 env[1191]: time="2024-12-13T15:23:01.865176563Z" level=info msg="RemovePodSandbox for \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:23:01.865354 env[1191]: time="2024-12-13T15:23:01.865245568Z" level=info msg="Forcibly stopping sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\"" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.920 [WARNING][5318] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68399294-9c0a-4ef3-b240-417363b4cedc", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"6b79ae0a8d94bfc941a7901bdb6cc21723df17d98c8df204df516527aa9fab92", Pod:"csi-node-driver-ntbs2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.46.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie3f299802da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.920 [INFO][5318] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.920 [INFO][5318] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" iface="eth0" netns="" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.921 [INFO][5318] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.921 [INFO][5318] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.961 [INFO][5324] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.961 [INFO][5324] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.961 [INFO][5324] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.972 [WARNING][5324] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.972 [INFO][5324] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" HandleID="k8s-pod-network.7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Workload="srv--fauys.gb1.brightbox.com-k8s-csi--node--driver--ntbs2-eth0" Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.974 [INFO][5324] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:01.977962 env[1191]: 2024-12-13 15:23:01.976 [INFO][5318] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a" Dec 13 15:23:01.979518 env[1191]: time="2024-12-13T15:23:01.978011876Z" level=info msg="TearDown network for sandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" successfully" Dec 13 15:23:01.984038 env[1191]: time="2024-12-13T15:23:01.983935534Z" level=info msg="RemovePodSandbox \"7fc88e4917dc10b7ff17ae86d0364598ad533a0a46751769b1538b6d0ca01d3a\" returns successfully" Dec 13 15:23:01.984883 env[1191]: time="2024-12-13T15:23:01.984847616Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.058 [WARNING][5345] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"426bdb98-dfef-400a-ae3c-4abfc89d28e3", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f", Pod:"coredns-7db6d8ff4d-5x5kh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ae4db3d6b9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.059 [INFO][5345] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.059 [INFO][5345] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" iface="eth0" netns="" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.059 [INFO][5345] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.059 [INFO][5345] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.115 [INFO][5351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.115 [INFO][5351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.115 [INFO][5351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.125 [WARNING][5351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.125 [INFO][5351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.128 [INFO][5351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:02.131743 env[1191]: 2024-12-13 15:23:02.130 [INFO][5345] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.136823 env[1191]: time="2024-12-13T15:23:02.132732645Z" level=info msg="TearDown network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" successfully" Dec 13 15:23:02.136823 env[1191]: time="2024-12-13T15:23:02.132787752Z" level=info msg="StopPodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" returns successfully" Dec 13 15:23:02.137560 env[1191]: time="2024-12-13T15:23:02.137182382Z" level=info msg="RemovePodSandbox for \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:23:02.137759 env[1191]: time="2024-12-13T15:23:02.137688436Z" level=info msg="Forcibly stopping sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\"" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.212 [WARNING][5371] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"426bdb98-dfef-400a-ae3c-4abfc89d28e3", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"ce39cc4bc63572003fa003d51dcfcdd691fb676d11450d8a1c13436a2d1f9b9f", Pod:"coredns-7db6d8ff4d-5x5kh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.46.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ae4db3d6b9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.212 [INFO][5371] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.213 [INFO][5371] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" iface="eth0" netns="" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.213 [INFO][5371] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.213 [INFO][5371] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.252 [INFO][5377] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.252 [INFO][5377] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.253 [INFO][5377] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.263 [WARNING][5377] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.263 [INFO][5377] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" HandleID="k8s-pod-network.773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Workload="srv--fauys.gb1.brightbox.com-k8s-coredns--7db6d8ff4d--5x5kh-eth0" Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.266 [INFO][5377] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:02.270772 env[1191]: 2024-12-13 15:23:02.267 [INFO][5371] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2" Dec 13 15:23:02.272176 env[1191]: time="2024-12-13T15:23:02.271649428Z" level=info msg="TearDown network for sandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" successfully" Dec 13 15:23:02.278816 env[1191]: time="2024-12-13T15:23:02.278776666Z" level=info msg="RemovePodSandbox \"773d5b563b363d1596d67838c3e98e7a6493539aa798d416991852207c7c87e2\" returns successfully" Dec 13 15:23:02.279624 env[1191]: time="2024-12-13T15:23:02.279578849Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.341 [WARNING][5395] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"2bb0905e-c268-4464-a7d2-c59f58942d08", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246", Pod:"calico-apiserver-998f79f5-llk82", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali69107010c25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.341 [INFO][5395] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.341 [INFO][5395] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" iface="eth0" netns="" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.341 [INFO][5395] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.341 [INFO][5395] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.394 [INFO][5401] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.395 [INFO][5401] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.395 [INFO][5401] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.408 [WARNING][5401] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.408 [INFO][5401] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.411 [INFO][5401] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:02.416688 env[1191]: 2024-12-13 15:23:02.413 [INFO][5395] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.416688 env[1191]: time="2024-12-13T15:23:02.414641603Z" level=info msg="TearDown network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" successfully" Dec 13 15:23:02.416688 env[1191]: time="2024-12-13T15:23:02.414689949Z" level=info msg="StopPodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" returns successfully" Dec 13 15:23:02.418163 env[1191]: time="2024-12-13T15:23:02.416843418Z" level=info msg="RemovePodSandbox for \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:23:02.418163 env[1191]: time="2024-12-13T15:23:02.416895423Z" level=info msg="Forcibly stopping sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\"" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.505 [WARNING][5422] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0", GenerateName:"calico-apiserver-998f79f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"2bb0905e-c268-4464-a7d2-c59f58942d08", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 21, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"998f79f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-fauys.gb1.brightbox.com", ContainerID:"ebd63b295400ecbed08d1e2bebd5efe6b2ec74fad7bb55166bbd38c6e1af0246", Pod:"calico-apiserver-998f79f5-llk82", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.46.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali69107010c25", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.514 [INFO][5422] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.514 [INFO][5422] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" iface="eth0" netns="" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.514 [INFO][5422] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.514 [INFO][5422] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.563 [INFO][5428] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.564 [INFO][5428] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.564 [INFO][5428] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.582 [WARNING][5428] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.583 [INFO][5428] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" HandleID="k8s-pod-network.d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Workload="srv--fauys.gb1.brightbox.com-k8s-calico--apiserver--998f79f5--llk82-eth0" Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.585 [INFO][5428] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:23:02.589751 env[1191]: 2024-12-13 15:23:02.587 [INFO][5422] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362" Dec 13 15:23:02.591557 env[1191]: time="2024-12-13T15:23:02.589739152Z" level=info msg="TearDown network for sandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" successfully" Dec 13 15:23:02.593754 env[1191]: time="2024-12-13T15:23:02.593701749Z" level=info msg="RemovePodSandbox \"d7d59f7e6d48aea61278db9b16eefe6e138d005a61229f91d2f53e685381f362\" returns successfully" Dec 13 15:23:04.888515 systemd[1]: Started sshd@12-10.244.14.190:22-139.178.68.195:46232.service. Dec 13 15:23:04.900474 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 15:23:04.901881 kernel: audit: type=1130 audit(1734103384.890:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.14.190:22-139.178.68.195:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:04.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.14.190:22-139.178.68.195:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:05.863000 audit[5438]: USER_ACCT pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.868843 sshd[5438]: Accepted publickey for core from 139.178.68.195 port 46232 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:05.874410 kernel: audit: type=1101 audit(1734103385.863:1400): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.874000 audit[5438]: CRED_ACQ pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.882249 kernel: audit: type=1103 audit(1734103385.874:1401): pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.887266 kernel: audit: type=1006 audit(1734103385.874:1402): pid=5438 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 15:23:05.887868 sshd[5438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:05.874000 audit[5438]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda969fdc0 a2=3 a3=0 items=0 ppid=1 pid=5438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:05.895341 kernel: audit: type=1300 audit(1734103385.874:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda969fdc0 a2=3 a3=0 items=0 ppid=1 pid=5438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:05.874000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:05.899246 kernel: audit: type=1327 audit(1734103385.874:1402): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:05.923303 systemd-logind[1180]: New session 10 of user core. Dec 13 15:23:05.924404 systemd[1]: Started session-10.scope. Dec 13 15:23:05.936000 audit[5438]: USER_START pid=5438 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.946307 kernel: audit: type=1105 audit(1734103385.936:1403): pid=5438 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.936000 audit[5441]: CRED_ACQ pid=5441 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:05.953306 kernel: audit: type=1103 audit(1734103385.936:1404): pid=5441 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:07.160280 sshd[5438]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:07.162000 audit[5438]: USER_END pid=5438 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:07.173368 kernel: audit: type=1106 audit(1734103387.162:1405): pid=5438 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:07.166343 systemd[1]: sshd@12-10.244.14.190:22-139.178.68.195:46232.service: Deactivated successfully. Dec 13 15:23:07.168176 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 15:23:07.172468 systemd-logind[1180]: Session 10 logged out. Waiting for processes to exit. Dec 13 15:23:07.162000 audit[5438]: CRED_DISP pid=5438 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:07.182339 kernel: audit: type=1104 audit(1734103387.162:1406): pid=5438 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:07.174385 systemd-logind[1180]: Removed session 10. Dec 13 15:23:07.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.14.190:22-139.178.68.195:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:09.770000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:09.771000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:09.771000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0037aeaa0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:09.771000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:09.770000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032db9e0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:09.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:09.779000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:09.779000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0037aeac0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:09.779000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:09.785000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:09.785000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032dbb80 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:09.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:12.312676 systemd[1]: Started sshd@13-10.244.14.190:22-139.178.68.195:57660.service. Dec 13 15:23:12.325480 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 15:23:12.328018 kernel: audit: type=1130 audit(1734103392.312:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.14.190:22-139.178.68.195:57660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:12.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.14.190:22-139.178.68.195:57660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:13.242000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.254021 sshd[5472]: Accepted publickey for core from 139.178.68.195 port 57660 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:13.254864 kernel: audit: type=1101 audit(1734103393.242:1413): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.254962 kernel: audit: type=1103 audit(1734103393.252:1414): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.252000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.265760 kernel: audit: type=1006 audit(1734103393.252:1415): pid=5472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 15:23:13.266424 kernel: audit: type=1300 audit(1734103393.252:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeabb5d4b0 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:13.252000 audit[5472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeabb5d4b0 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:13.267293 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:13.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:13.278321 kernel: audit: type=1327 audit(1734103393.252:1415): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:13.290041 systemd-logind[1180]: New session 11 of user core. Dec 13 15:23:13.291699 systemd[1]: Started session-11.scope. Dec 13 15:23:13.301000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.310298 kernel: audit: type=1105 audit(1734103393.301:1416): pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.311441 kernel: audit: type=1103 audit(1734103393.309:1417): pid=5480 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:13.309000 audit[5480]: CRED_ACQ pid=5480 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:14.102790 sshd[5472]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:14.104000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:14.114255 kernel: audit: type=1106 audit(1734103394.104:1418): pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:14.123371 kernel: audit: type=1104 audit(1734103394.105:1419): pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:14.105000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:14.114429 systemd[1]: sshd@13-10.244.14.190:22-139.178.68.195:57660.service: Deactivated successfully. Dec 13 15:23:14.119425 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 15:23:14.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.14.190:22-139.178.68.195:57660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:14.125974 systemd-logind[1180]: Session 11 logged out. Waiting for processes to exit. Dec 13 15:23:14.128470 systemd-logind[1180]: Removed session 11. Dec 13 15:23:19.253855 systemd[1]: Started sshd@14-10.244.14.190:22-139.178.68.195:48472.service. Dec 13 15:23:19.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.14.190:22-139.178.68.195:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:19.256775 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:23:19.256871 kernel: audit: type=1130 audit(1734103399.253:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.14.190:22-139.178.68.195:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:20.182000 audit[5495]: USER_ACCT pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.184133 sshd[5495]: Accepted publickey for core from 139.178.68.195 port 48472 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:20.191271 kernel: audit: type=1101 audit(1734103400.182:1422): pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.191000 audit[5495]: CRED_ACQ pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.204050 kernel: audit: type=1103 audit(1734103400.191:1423): pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.204195 kernel: audit: type=1006 audit(1734103400.191:1424): pid=5495 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 15:23:20.203540 sshd[5495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:20.191000 audit[5495]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc282d31c0 a2=3 a3=0 items=0 ppid=1 pid=5495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:20.214365 kernel: audit: type=1300 audit(1734103400.191:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc282d31c0 a2=3 a3=0 items=0 ppid=1 pid=5495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:20.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:20.217253 kernel: audit: type=1327 audit(1734103400.191:1424): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:20.224013 systemd-logind[1180]: New session 12 of user core. Dec 13 15:23:20.227047 systemd[1]: Started session-12.scope. Dec 13 15:23:20.234000 audit[5495]: USER_START pid=5495 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.245023 kernel: audit: type=1105 audit(1734103400.234:1425): pid=5495 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.245150 kernel: audit: type=1103 audit(1734103400.243:1426): pid=5497 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.243000 audit[5497]: CRED_ACQ pid=5497 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.972432 sshd[5495]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:20.976000 audit[5495]: USER_END pid=5495 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.980092 systemd[1]: sshd@14-10.244.14.190:22-139.178.68.195:48472.service: Deactivated successfully. Dec 13 15:23:20.988398 kernel: audit: type=1106 audit(1734103400.976:1427): pid=5495 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.988547 kernel: audit: type=1104 audit(1734103400.976:1428): pid=5495 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.976000 audit[5495]: CRED_DISP pid=5495 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:20.987280 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 15:23:20.987783 systemd-logind[1180]: Session 12 logged out. Waiting for processes to exit. Dec 13 15:23:20.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.14.190:22-139.178.68.195:48472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:20.994916 systemd-logind[1180]: Removed session 12. Dec 13 15:23:21.120894 systemd[1]: Started sshd@15-10.244.14.190:22-139.178.68.195:48474.service. Dec 13 15:23:21.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.14.190:22-139.178.68.195:48474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:22.019000 audit[5507]: USER_ACCT pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:22.020779 sshd[5507]: Accepted publickey for core from 139.178.68.195 port 48474 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:22.020000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:22.021000 audit[5507]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff422701a0 a2=3 a3=0 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:22.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:22.023390 sshd[5507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:22.031439 systemd-logind[1180]: New session 13 of user core. Dec 13 15:23:22.031829 systemd[1]: Started session-13.scope. Dec 13 15:23:22.040000 audit[5507]: USER_START pid=5507 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:22.043000 audit[5527]: CRED_ACQ pid=5527 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:22.851655 sshd[5507]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:22.852000 audit[5507]: USER_END pid=5507 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:22.853000 audit[5507]: CRED_DISP pid=5507 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:22.856084 systemd[1]: sshd@15-10.244.14.190:22-139.178.68.195:48474.service: Deactivated successfully. Dec 13 15:23:22.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.14.190:22-139.178.68.195:48474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:22.857322 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 15:23:22.858148 systemd-logind[1180]: Session 13 logged out. Waiting for processes to exit. Dec 13 15:23:22.859890 systemd-logind[1180]: Removed session 13. Dec 13 15:23:22.999395 systemd[1]: Started sshd@16-10.244.14.190:22-139.178.68.195:48490.service. Dec 13 15:23:22.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.14.190:22-139.178.68.195:48490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:23.899857 sshd[5535]: Accepted publickey for core from 139.178.68.195 port 48490 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:23.898000 audit[5535]: USER_ACCT pid=5535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:23.900000 audit[5535]: CRED_ACQ pid=5535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:23.901000 audit[5535]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff59ec8740 a2=3 a3=0 items=0 ppid=1 pid=5535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:23.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:23.902902 sshd[5535]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:23.910286 systemd-logind[1180]: New session 14 of user core. Dec 13 15:23:23.911597 systemd[1]: Started session-14.scope. Dec 13 15:23:23.918000 audit[5535]: USER_START pid=5535 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:23.921000 audit[5537]: CRED_ACQ pid=5537 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:24.652453 sshd[5535]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:24.669576 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:23:24.669998 kernel: audit: type=1106 audit(1734103404.653:1445): pid=5535 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:24.653000 audit[5535]: USER_END pid=5535 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:24.671184 systemd-logind[1180]: Session 14 logged out. Waiting for processes to exit. Dec 13 15:23:24.664000 audit[5535]: CRED_DISP pid=5535 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:24.673339 systemd[1]: sshd@16-10.244.14.190:22-139.178.68.195:48490.service: Deactivated successfully. Dec 13 15:23:24.674896 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 15:23:24.681268 kernel: audit: type=1104 audit(1734103404.664:1446): pid=5535 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:24.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.14.190:22-139.178.68.195:48490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:24.685373 systemd-logind[1180]: Removed session 14. Dec 13 15:23:24.688286 kernel: audit: type=1131 audit(1734103404.673:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.14.190:22-139.178.68.195:48490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:26.639930 systemd[1]: run-containerd-runc-k8s.io-919f9b827ef3acc1d0d21ce4655a884bf035caf4592eca0492963bdd7e877f39-runc.ERzOOh.mount: Deactivated successfully. Dec 13 15:23:29.804335 systemd[1]: Started sshd@17-10.244.14.190:22-139.178.68.195:43634.service. Dec 13 15:23:29.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.14.190:22-139.178.68.195:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:29.827267 kernel: audit: type=1130 audit(1734103409.804:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.14.190:22-139.178.68.195:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:30.782000 audit[5575]: USER_ACCT pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.785128 sshd[5575]: Accepted publickey for core from 139.178.68.195 port 43634 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:30.791252 kernel: audit: type=1101 audit(1734103410.782:1449): pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.791000 audit[5575]: CRED_ACQ pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.800265 kernel: audit: type=1103 audit(1734103410.791:1450): pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.792000 audit[5575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc21af87f0 a2=3 a3=0 items=0 ppid=1 pid=5575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.811786 kernel: audit: type=1006 audit(1734103410.792:1451): pid=5575 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 15:23:30.812413 kernel: audit: type=1300 audit(1734103410.792:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc21af87f0 a2=3 a3=0 items=0 ppid=1 pid=5575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:30.813291 sshd[5575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:30.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:30.816423 kernel: audit: type=1327 audit(1734103410.792:1451): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:30.828330 systemd-logind[1180]: New session 15 of user core. Dec 13 15:23:30.828963 systemd[1]: Started session-15.scope. Dec 13 15:23:30.838000 audit[5575]: USER_START pid=5575 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.846000 audit[5577]: CRED_ACQ pid=5577 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.854004 kernel: audit: type=1105 audit(1734103410.838:1452): pid=5575 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:30.854122 kernel: audit: type=1103 audit(1734103410.846:1453): pid=5577 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:31.662817 sshd[5575]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:31.665000 audit[5575]: USER_END pid=5575 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:31.675556 kernel: audit: type=1106 audit(1734103411.665:1454): pid=5575 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:31.675397 systemd[1]: sshd@17-10.244.14.190:22-139.178.68.195:43634.service: Deactivated successfully. Dec 13 15:23:31.677024 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 15:23:31.666000 audit[5575]: CRED_DISP pid=5575 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:31.687315 kernel: audit: type=1104 audit(1734103411.666:1455): pid=5575 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:31.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.14.190:22-139.178.68.195:43634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:31.687254 systemd-logind[1180]: Session 15 logged out. Waiting for processes to exit. Dec 13 15:23:31.692780 systemd-logind[1180]: Removed session 15. Dec 13 15:23:36.811360 systemd[1]: Started sshd@18-10.244.14.190:22-139.178.68.195:42112.service. Dec 13 15:23:36.815705 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:23:36.816020 kernel: audit: type=1130 audit(1734103416.811:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.14.190:22-139.178.68.195:42112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:36.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.14.190:22-139.178.68.195:42112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:37.711000 audit[5587]: USER_ACCT pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.720934 kernel: audit: type=1101 audit(1734103417.711:1458): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.721028 sshd[5587]: Accepted publickey for core from 139.178.68.195 port 42112 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:37.728431 kernel: audit: type=1103 audit(1734103417.719:1459): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.719000 audit[5587]: CRED_ACQ pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.721870 sshd[5587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:37.749863 kernel: audit: type=1006 audit(1734103417.719:1460): pid=5587 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 15:23:37.750919 kernel: audit: type=1300 audit(1734103417.719:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea41ad000 a2=3 a3=0 items=0 ppid=1 pid=5587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:37.719000 audit[5587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea41ad000 a2=3 a3=0 items=0 ppid=1 pid=5587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:37.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:37.755343 kernel: audit: type=1327 audit(1734103417.719:1460): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:37.762079 systemd-logind[1180]: New session 16 of user core. Dec 13 15:23:37.762117 systemd[1]: Started session-16.scope. Dec 13 15:23:37.772000 audit[5587]: USER_START pid=5587 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.781327 kernel: audit: type=1105 audit(1734103417.772:1461): pid=5587 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.782590 kernel: audit: type=1103 audit(1734103417.780:1462): pid=5589 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:37.780000 audit[5589]: CRED_ACQ pid=5589 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:38.510667 sshd[5587]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:38.511000 audit[5587]: USER_END pid=5587 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:38.526016 kernel: audit: type=1106 audit(1734103418.511:1463): pid=5587 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:38.527000 audit[5587]: CRED_DISP pid=5587 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:38.541245 kernel: audit: type=1104 audit(1734103418.527:1464): pid=5587 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:38.543180 systemd[1]: sshd@18-10.244.14.190:22-139.178.68.195:42112.service: Deactivated successfully. Dec 13 15:23:38.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.14.190:22-139.178.68.195:42112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:38.544917 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 15:23:38.546309 systemd-logind[1180]: Session 16 logged out. Waiting for processes to exit. Dec 13 15:23:38.548041 systemd-logind[1180]: Removed session 16. Dec 13 15:23:40.871327 systemd[1]: run-containerd-runc-k8s.io-e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce-runc.lcnLwg.mount: Deactivated successfully. Dec 13 15:23:42.106000 audit[4885]: AVC avc: denied { watch } for pid=4885 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_21_40.3710473740/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c932 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c310,c932 tclass=file permissive=0 Dec 13 15:23:42.119055 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:23:42.119329 kernel: audit: type=1400 audit(1734103422.106:1466): avc: denied { watch } for pid=4885 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_21_40.3710473740/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c932 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c310,c932 tclass=file permissive=0 Dec 13 15:23:42.106000 audit[4885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a73780 a2=fc6 a3=0 items=0 ppid=4465 pid=4885 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c932 key=(null) Dec 13 15:23:42.106000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:23:42.137969 kernel: audit: type=1300 audit(1734103422.106:1466): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a73780 a2=fc6 a3=0 items=0 ppid=4465 pid=4885 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c932 key=(null) Dec 13 15:23:42.138169 kernel: audit: type=1327 audit(1734103422.106:1466): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:23:43.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.14.190:22-139.178.68.195:42126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:43.663574 systemd[1]: Started sshd@19-10.244.14.190:22-139.178.68.195:42126.service. Dec 13 15:23:43.670355 kernel: audit: type=1130 audit(1734103423.662:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.14.190:22-139.178.68.195:42126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:44.569000 audit[5618]: USER_ACCT pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:44.578012 sshd[5618]: Accepted publickey for core from 139.178.68.195 port 42126 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:44.578903 kernel: audit: type=1101 audit(1734103424.569:1468): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:44.585795 kernel: audit: type=1103 audit(1734103424.577:1469): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:44.577000 audit[5618]: CRED_ACQ pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:44.579156 sshd[5618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:44.592268 kernel: audit: type=1006 audit(1734103424.577:1470): pid=5618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 15:23:44.577000 audit[5618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25bcb930 a2=3 a3=0 items=0 ppid=1 pid=5618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.600293 kernel: audit: type=1300 audit(1734103424.577:1470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25bcb930 a2=3 a3=0 items=0 ppid=1 pid=5618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:44.600883 kernel: audit: type=1327 audit(1734103424.577:1470): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:44.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:44.608348 systemd-logind[1180]: New session 17 of user core. Dec 13 15:23:44.609422 systemd[1]: Started session-17.scope. Dec 13 15:23:44.616000 audit[5618]: USER_START pid=5618 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:44.626454 kernel: audit: type=1105 audit(1734103424.616:1471): pid=5618 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:44.624000 audit[5620]: CRED_ACQ pid=5620 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:45.365898 sshd[5618]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:45.367000 audit[5618]: USER_END pid=5618 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:45.367000 audit[5618]: CRED_DISP pid=5618 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:45.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.14.190:22-139.178.68.195:42126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:45.371312 systemd-logind[1180]: Session 17 logged out. Waiting for processes to exit. Dec 13 15:23:45.371830 systemd[1]: sshd@19-10.244.14.190:22-139.178.68.195:42126.service: Deactivated successfully. Dec 13 15:23:45.373086 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 15:23:45.374882 systemd-logind[1180]: Removed session 17. Dec 13 15:23:48.185000 audit[5009]: AVC avc: denied { watch } for pid=5009 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_21_40.3267589723/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c750 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c675,c750 tclass=file permissive=0 Dec 13 15:23:48.188254 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 15:23:48.188371 kernel: audit: type=1400 audit(1734103428.185:1476): avc: denied { watch } for pid=5009 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_21_40.3267589723/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c750 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c675,c750 tclass=file permissive=0 Dec 13 15:23:48.185000 audit[5009]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016d4160 a2=fc6 a3=0 items=0 ppid=4834 pid=5009 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c750 key=(null) Dec 13 15:23:48.203980 kernel: audit: type=1300 audit(1734103428.185:1476): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016d4160 a2=fc6 a3=0 items=0 ppid=4834 pid=5009 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c750 key=(null) Dec 13 15:23:48.204103 kernel: audit: type=1327 audit(1734103428.185:1476): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:23:48.185000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:23:50.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.14.190:22-139.178.68.195:36828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:50.525724 kernel: audit: type=1130 audit(1734103430.514:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.14.190:22-139.178.68.195:36828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:50.514980 systemd[1]: Started sshd@20-10.244.14.190:22-139.178.68.195:36828.service. Dec 13 15:23:51.452954 sshd[5632]: Accepted publickey for core from 139.178.68.195 port 36828 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:51.451000 audit[5632]: USER_ACCT pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:51.460258 kernel: audit: type=1101 audit(1734103431.451:1478): pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:51.460782 sshd[5632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:51.458000 audit[5632]: CRED_ACQ pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:51.468266 kernel: audit: type=1103 audit(1734103431.458:1479): pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:51.474727 kernel: audit: type=1006 audit(1734103431.458:1480): pid=5632 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 15:23:51.474891 kernel: audit: type=1300 audit(1734103431.458:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2b5dd540 a2=3 a3=0 items=0 ppid=1 pid=5632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:51.458000 audit[5632]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2b5dd540 a2=3 a3=0 items=0 ppid=1 pid=5632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:51.482514 kernel: audit: type=1327 audit(1734103431.458:1480): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:51.458000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:51.486442 systemd-logind[1180]: New session 18 of user core. Dec 13 15:23:51.487897 systemd[1]: Started session-18.scope. Dec 13 15:23:51.508322 kernel: audit: type=1105 audit(1734103431.495:1481): pid=5632 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:51.495000 audit[5632]: USER_START pid=5632 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:51.496000 audit[5634]: CRED_ACQ pid=5634 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:52.222429 sshd[5632]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:52.223000 audit[5632]: USER_END pid=5632 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:52.223000 audit[5632]: CRED_DISP pid=5632 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:52.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.14.190:22-139.178.68.195:36828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:52.226979 systemd[1]: sshd@20-10.244.14.190:22-139.178.68.195:36828.service: Deactivated successfully. Dec 13 15:23:52.228458 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 15:23:52.229941 systemd-logind[1180]: Session 18 logged out. Waiting for processes to exit. Dec 13 15:23:52.232050 systemd-logind[1180]: Removed session 18. Dec 13 15:23:52.373353 systemd[1]: Started sshd@21-10.244.14.190:22-139.178.68.195:36838.service. Dec 13 15:23:52.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.14.190:22-139.178.68.195:36838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:53.280895 sshd[5643]: Accepted publickey for core from 139.178.68.195 port 36838 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:53.285269 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 15:23:53.285395 kernel: audit: type=1101 audit(1734103433.279:1487): pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.279000 audit[5643]: USER_ACCT pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.289267 sshd[5643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:53.287000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.299441 kernel: audit: type=1103 audit(1734103433.287:1488): pid=5643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.287000 audit[5643]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff067e4360 a2=3 a3=0 items=0 ppid=1 pid=5643 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:53.310542 kernel: audit: type=1006 audit(1734103433.287:1489): pid=5643 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 15:23:53.310773 kernel: audit: type=1300 audit(1734103433.287:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff067e4360 a2=3 a3=0 items=0 ppid=1 pid=5643 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:53.310596 systemd-logind[1180]: New session 19 of user core. Dec 13 15:23:53.287000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:53.312171 systemd[1]: Started session-19.scope. Dec 13 15:23:53.314318 kernel: audit: type=1327 audit(1734103433.287:1489): proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:53.320000 audit[5643]: USER_START pid=5643 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.322000 audit[5651]: CRED_ACQ pid=5651 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.349658 kernel: audit: type=1105 audit(1734103433.320:1490): pid=5643 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:53.350178 kernel: audit: type=1103 audit(1734103433.322:1491): pid=5651 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:54.247000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:54.247000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008e4810 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:54.266064 kernel: audit: type=1400 audit(1734103434.247:1492): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:54.266267 kernel: audit: type=1300 audit(1734103434.247:1492): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008e4810 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:54.247000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:54.251000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:54.251000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010ead40 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:23:54.251000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:54.274299 kernel: audit: type=1327 audit(1734103434.247:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:23:54.422586 sshd[5643]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:54.424000 audit[5643]: USER_END pid=5643 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:54.425000 audit[5643]: CRED_DISP pid=5643 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:54.428844 systemd[1]: sshd@21-10.244.14.190:22-139.178.68.195:36838.service: Deactivated successfully. Dec 13 15:23:54.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.14.190:22-139.178.68.195:36838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:54.430107 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 15:23:54.431198 systemd-logind[1180]: Session 19 logged out. Waiting for processes to exit. Dec 13 15:23:54.433569 systemd-logind[1180]: Removed session 19. Dec 13 15:23:54.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.14.190:22-139.178.68.195:36840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:54.569470 systemd[1]: Started sshd@22-10.244.14.190:22-139.178.68.195:36840.service. Dec 13 15:23:55.471000 audit[5659]: USER_ACCT pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:55.472759 sshd[5659]: Accepted publickey for core from 139.178.68.195 port 36840 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:23:55.473000 audit[5659]: CRED_ACQ pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:55.473000 audit[5659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd498cbe40 a2=3 a3=0 items=0 ppid=1 pid=5659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:55.473000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:23:55.475578 sshd[5659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:23:55.483135 systemd-logind[1180]: New session 20 of user core. Dec 13 15:23:55.484292 systemd[1]: Started session-20.scope. Dec 13 15:23:55.492000 audit[5659]: USER_START pid=5659 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:55.495000 audit[5661]: CRED_ACQ pid=5661 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:56.125000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:56.125000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0105995a0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:23:56.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:23:56.125000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:56.125000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0105995c0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:23:56.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:23:56.126000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:56.126000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f4bae70 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:23:56.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:23:56.126000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:56.126000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f4baea0 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:23:56.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:23:56.130000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:56.130000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c000704900 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:23:56.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:23:56.136000 audit[1946]: AVC avc: denied { watch } for pid=1946 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:23:56.136000 audit[1946]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f4bb080 a2=fc6 a3=0 items=0 ppid=1797 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c649 key=(null) Dec 13 15:23:56.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31342E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 15:23:59.123700 kernel: kauditd_printk_skb: 32 callbacks suppressed Dec 13 15:23:59.138565 kernel: audit: type=1325 audit(1734103439.117:1509): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5694 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.139279 kernel: audit: type=1300 audit(1734103439.117:1509): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd9416b3d0 a2=0 a3=7ffd9416b3bc items=0 ppid=2205 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.139615 kernel: audit: type=1327 audit(1734103439.117:1509): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.117000 audit[5694]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5694 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.117000 audit[5694]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd9416b3d0 a2=0 a3=7ffd9416b3bc items=0 ppid=2205 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.143000 audit[5694]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5694 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.149425 kernel: audit: type=1325 audit(1734103439.143:1510): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5694 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.143000 audit[5694]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9416b3d0 a2=0 a3=0 items=0 ppid=2205 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.166003 kernel: audit: type=1300 audit(1734103439.143:1510): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd9416b3d0 a2=0 a3=0 items=0 ppid=2205 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.166450 kernel: audit: type=1327 audit(1734103439.143:1510): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.179000 audit[5696]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.196958 kernel: audit: type=1325 audit(1734103439.179:1511): table=filter:123 family=2 entries=32 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.197101 kernel: audit: type=1300 audit(1734103439.179:1511): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc54f33620 a2=0 a3=7ffc54f3360c items=0 ppid=2205 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.179000 audit[5696]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc54f33620 a2=0 a3=7ffc54f3360c items=0 ppid=2205 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.203336 kernel: audit: type=1327 audit(1734103439.179:1511): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.212884 sshd[5659]: pam_unix(sshd:session): session closed for user core Dec 13 15:23:59.217000 audit[5696]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.223308 kernel: audit: type=1325 audit(1734103439.217:1512): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:23:59.217000 audit[5696]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc54f33620 a2=0 a3=0 items=0 ppid=2205 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:23:59.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:23:59.226000 audit[5659]: USER_END pid=5659 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:59.227000 audit[5659]: CRED_DISP pid=5659 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:23:59.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.14.190:22-139.178.68.195:36840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:23:59.244290 systemd[1]: sshd@22-10.244.14.190:22-139.178.68.195:36840.service: Deactivated successfully. Dec 13 15:23:59.244593 systemd-logind[1180]: Session 20 logged out. Waiting for processes to exit. Dec 13 15:23:59.249179 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 15:23:59.249740 systemd[1]: session-20.scope: Consumed 1.192s CPU time. Dec 13 15:23:59.251085 systemd-logind[1180]: Removed session 20. Dec 13 15:23:59.354097 systemd[1]: Started sshd@23-10.244.14.190:22-139.178.68.195:46160.service. Dec 13 15:23:59.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.14.190:22-139.178.68.195:46160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:00.274791 sshd[5699]: Accepted publickey for core from 139.178.68.195 port 46160 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:24:00.274000 audit[5699]: USER_ACCT pid=5699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:00.276000 audit[5699]: CRED_ACQ pid=5699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:00.276000 audit[5699]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd97c96870 a2=3 a3=0 items=0 ppid=1 pid=5699 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:00.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:00.279198 sshd[5699]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:24:00.288303 systemd-logind[1180]: New session 21 of user core. Dec 13 15:24:00.289390 systemd[1]: Started session-21.scope. Dec 13 15:24:00.299000 audit[5699]: USER_START pid=5699 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:00.301000 audit[5701]: CRED_ACQ pid=5701 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:01.921161 sshd[5699]: pam_unix(sshd:session): session closed for user core Dec 13 15:24:01.925000 audit[5699]: USER_END pid=5699 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:01.925000 audit[5699]: CRED_DISP pid=5699 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:01.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.14.190:22-139.178.68.195:46160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:01.928257 systemd[1]: sshd@23-10.244.14.190:22-139.178.68.195:46160.service: Deactivated successfully. Dec 13 15:24:01.930151 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 15:24:01.933526 systemd-logind[1180]: Session 21 logged out. Waiting for processes to exit. Dec 13 15:24:01.935532 systemd-logind[1180]: Removed session 21. Dec 13 15:24:02.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.14.190:22-139.178.68.195:46164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:02.063912 systemd[1]: Started sshd@24-10.244.14.190:22-139.178.68.195:46164.service. Dec 13 15:24:02.970000 audit[5711]: USER_ACCT pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:02.972933 sshd[5711]: Accepted publickey for core from 139.178.68.195 port 46164 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:24:02.973000 audit[5711]: CRED_ACQ pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:02.974000 audit[5711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0faaecf0 a2=3 a3=0 items=0 ppid=1 pid=5711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:02.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:02.975661 sshd[5711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:24:02.985443 systemd[1]: Started session-22.scope. Dec 13 15:24:02.986443 systemd-logind[1180]: New session 22 of user core. Dec 13 15:24:02.996000 audit[5711]: USER_START pid=5711 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:02.998000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:03.814432 sshd[5711]: pam_unix(sshd:session): session closed for user core Dec 13 15:24:03.816000 audit[5711]: USER_END pid=5711 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:03.816000 audit[5711]: CRED_DISP pid=5711 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:03.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.14.190:22-139.178.68.195:46164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:03.819979 systemd[1]: sshd@24-10.244.14.190:22-139.178.68.195:46164.service: Deactivated successfully. Dec 13 15:24:03.821441 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 15:24:03.822609 systemd-logind[1180]: Session 22 logged out. Waiting for processes to exit. Dec 13 15:24:03.823964 systemd-logind[1180]: Removed session 22. Dec 13 15:24:07.524000 audit[5727]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5727 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:24:07.546943 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 15:24:07.547742 kernel: audit: type=1325 audit(1734103447.524:1534): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5727 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:24:07.547857 kernel: audit: type=1300 audit(1734103447.524:1534): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeb08094e0 a2=0 a3=7ffeb08094cc items=0 ppid=2205 pid=5727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:07.524000 audit[5727]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeb08094e0 a2=0 a3=7ffeb08094cc items=0 ppid=2205 pid=5727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:07.557560 kernel: audit: type=1327 audit(1734103447.524:1534): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:24:07.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:24:07.555000 audit[5727]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5727 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:24:07.555000 audit[5727]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffeb08094e0 a2=0 a3=7ffeb08094cc items=0 ppid=2205 pid=5727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:07.570837 kernel: audit: type=1325 audit(1734103447.555:1535): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5727 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:24:07.570956 kernel: audit: type=1300 audit(1734103447.555:1535): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffeb08094e0 a2=0 a3=7ffeb08094cc items=0 ppid=2205 pid=5727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:07.571353 kernel: audit: type=1327 audit(1734103447.555:1535): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:24:07.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:24:08.963139 systemd[1]: Started sshd@25-10.244.14.190:22-139.178.68.195:52822.service. Dec 13 15:24:08.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.14.190:22-139.178.68.195:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:08.970252 kernel: audit: type=1130 audit(1734103448.962:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.14.190:22-139.178.68.195:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:09.782000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:24:09.782000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:24:09.799523 kernel: audit: type=1400 audit(1734103449.782:1537): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:24:09.799671 kernel: audit: type=1400 audit(1734103449.782:1538): avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:24:09.799752 kernel: audit: type=1300 audit(1734103449.782:1538): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002066800 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:24:09.782000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002066800 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:24:09.782000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:24:09.782000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c26740 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:24:09.782000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:24:09.788000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:24:09.788000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c26760 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:24:09.788000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:24:09.795000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:24:09.795000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002066be0 a2=fc6 a3=0 items=0 ppid=1771 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c265,c799 key=(null) Dec 13 15:24:09.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:24:09.901000 audit[5730]: USER_ACCT pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:09.903789 sshd[5730]: Accepted publickey for core from 139.178.68.195 port 52822 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:24:09.903000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:09.904000 audit[5730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef78658f0 a2=3 a3=0 items=0 ppid=1 pid=5730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:09.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:09.907568 sshd[5730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:24:09.919450 systemd[1]: Started session-23.scope. Dec 13 15:24:09.920965 systemd-logind[1180]: New session 23 of user core. Dec 13 15:24:09.929000 audit[5730]: USER_START pid=5730 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:09.932000 audit[5744]: CRED_ACQ pid=5744 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:10.729359 sshd[5730]: pam_unix(sshd:session): session closed for user core Dec 13 15:24:10.730000 audit[5730]: USER_END pid=5730 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:10.731000 audit[5730]: CRED_DISP pid=5730 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:10.735340 systemd[1]: sshd@25-10.244.14.190:22-139.178.68.195:52822.service: Deactivated successfully. Dec 13 15:24:10.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.14.190:22-139.178.68.195:52822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:10.737290 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 15:24:10.740211 systemd-logind[1180]: Session 23 logged out. Waiting for processes to exit. Dec 13 15:24:10.743197 systemd-logind[1180]: Removed session 23. Dec 13 15:24:10.876208 systemd[1]: run-containerd-runc-k8s.io-e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce-runc.VpVvs4.mount: Deactivated successfully. Dec 13 15:24:15.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.14.190:22-139.178.68.195:52838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:15.877339 systemd[1]: Started sshd@26-10.244.14.190:22-139.178.68.195:52838.service. Dec 13 15:24:15.885900 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 15:24:15.886530 kernel: audit: type=1130 audit(1734103455.876:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.14.190:22-139.178.68.195:52838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:16.784000 audit[5773]: USER_ACCT pid=5773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.786271 sshd[5773]: Accepted publickey for core from 139.178.68.195 port 52838 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:24:16.793263 kernel: audit: type=1101 audit(1734103456.784:1550): pid=5773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.795421 sshd[5773]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:24:16.793000 audit[5773]: CRED_ACQ pid=5773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.805137 kernel: audit: type=1103 audit(1734103456.793:1551): pid=5773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.810170 systemd[1]: Started session-24.scope. Dec 13 15:24:16.811385 kernel: audit: type=1006 audit(1734103456.793:1552): pid=5773 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 15:24:16.793000 audit[5773]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd6daef50 a2=3 a3=0 items=0 ppid=1 pid=5773 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:16.811518 systemd-logind[1180]: New session 24 of user core. Dec 13 15:24:16.819358 kernel: audit: type=1300 audit(1734103456.793:1552): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd6daef50 a2=3 a3=0 items=0 ppid=1 pid=5773 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:16.793000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:16.825264 kernel: audit: type=1327 audit(1734103456.793:1552): proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:16.829000 audit[5773]: USER_START pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.832000 audit[5775]: CRED_ACQ pid=5775 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.844893 kernel: audit: type=1105 audit(1734103456.829:1553): pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:16.844997 kernel: audit: type=1103 audit(1734103456.832:1554): pid=5775 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:17.540482 sshd[5773]: pam_unix(sshd:session): session closed for user core Dec 13 15:24:17.540000 audit[5773]: USER_END pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:17.553279 kernel: audit: type=1106 audit(1734103457.540:1555): pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:17.553401 systemd[1]: sshd@26-10.244.14.190:22-139.178.68.195:52838.service: Deactivated successfully. Dec 13 15:24:17.554712 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 15:24:17.540000 audit[5773]: CRED_DISP pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:17.556375 systemd-logind[1180]: Session 24 logged out. Waiting for processes to exit. Dec 13 15:24:17.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.14.190:22-139.178.68.195:52838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:17.564417 kernel: audit: type=1104 audit(1734103457.540:1556): pid=5773 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:17.563991 systemd-logind[1180]: Removed session 24. Dec 13 15:24:21.299932 systemd[1]: run-containerd-runc-k8s.io-e6ad41c626b4060dc198c048f494d57868b0b36803963b7273ef524a2a632bce-runc.xSdNrY.mount: Deactivated successfully. Dec 13 15:24:22.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.14.190:22-139.178.68.195:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:22.689905 systemd[1]: Started sshd@27-10.244.14.190:22-139.178.68.195:46918.service. Dec 13 15:24:22.695145 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:24:22.697305 kernel: audit: type=1130 audit(1734103462.689:1558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.14.190:22-139.178.68.195:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:23.601000 audit[5806]: USER_ACCT pid=5806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.602823 sshd[5806]: Accepted publickey for core from 139.178.68.195 port 46918 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:24:23.610252 kernel: audit: type=1101 audit(1734103463.601:1559): pid=5806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.609000 audit[5806]: CRED_ACQ pid=5806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.612055 sshd[5806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:24:23.618351 kernel: audit: type=1103 audit(1734103463.609:1560): pid=5806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.623258 kernel: audit: type=1006 audit(1734103463.609:1561): pid=5806 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 15:24:23.609000 audit[5806]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5c22f690 a2=3 a3=0 items=0 ppid=1 pid=5806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:23.630312 kernel: audit: type=1300 audit(1734103463.609:1561): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5c22f690 a2=3 a3=0 items=0 ppid=1 pid=5806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:24:23.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:23.634253 kernel: audit: type=1327 audit(1734103463.609:1561): proctitle=737368643A20636F7265205B707269765D Dec 13 15:24:23.637623 systemd-logind[1180]: New session 25 of user core. Dec 13 15:24:23.638825 systemd[1]: Started session-25.scope. Dec 13 15:24:23.647000 audit[5806]: USER_START pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.658274 kernel: audit: type=1105 audit(1734103463.647:1562): pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.658382 kernel: audit: type=1103 audit(1734103463.656:1563): pid=5808 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:23.656000 audit[5808]: CRED_ACQ pid=5808 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:24.371324 sshd[5806]: pam_unix(sshd:session): session closed for user core Dec 13 15:24:24.372000 audit[5806]: USER_END pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:24.381246 kernel: audit: type=1106 audit(1734103464.372:1564): pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:24.381755 kernel: audit: type=1104 audit(1734103464.372:1565): pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:24.372000 audit[5806]: CRED_DISP pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:24:24.388368 systemd[1]: sshd@27-10.244.14.190:22-139.178.68.195:46918.service: Deactivated successfully. Dec 13 15:24:24.390030 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 15:24:24.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.14.190:22-139.178.68.195:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:24:24.391072 systemd-logind[1180]: Session 25 logged out. Waiting for processes to exit. Dec 13 15:24:24.392764 systemd-logind[1180]: Removed session 25.